Towards Lightweight Black-Box Attack Against Deep Neural NetworksDownload PDF

Published: 31 Oct 2022, 18:00, Last Modified: 11 Jan 2023, 10:13NeurIPS 2022 AcceptReaders: Everyone
Keywords: Adversarial examples, Adversarial attacks, Black-box attack.
TL;DR: This paper enables black-box attack to generate powerful adversarial examples even when only one sample per category is available for adversaries.
Abstract: Black-box attacks can generate adversarial examples without accessing the parameters of target model, largely exacerbating the threats of deployed deep neural networks (DNNs). However, previous works state that black-box attacks fail to mislead target models when their training data and outputs are inaccessible. In this work, we argue that black-box attacks can pose practical attacks in this extremely restrictive scenario where only several test samples are available. Specifically, we find that attacking the shallow layers of DNNs trained on a few test samples can generate powerful adversarial examples. As only a few samples are required, we refer to these attacks as lightweight black-box attacks. The main challenge to promoting lightweight attacks is to mitigate the adverse impact caused by the approximation error of shallow layers. As it is hard to mitigate the approximation error with few available samples, we propose Error TransFormer (ETF) for lightweight attacks. Namely, ETF transforms the approximation error in the parameter space into a perturbation in the feature space and alleviates the error by disturbing features. In experiments, lightweight black-box attacks with the proposed ETF achieve surprising results. For example, even if only 1 sample per category available, the attack success rate in lightweight black-box attacks is only about 3% lower than that of the black-box attacks with complete training data.
Supplementary Material: pdf
28 Replies

Loading