LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack

03/19/2021
by   Ashkan Esmaeili, et al.
0

We propose LSDAT, an image-agnostic decision-based black-box attack that exploits low-rank and sparse decomposition (LSD) to dramatically reduce the number of queries and achieve superior fooling rates compared to the state-of-the-art decision-based methods under given imperceptibility constraints. LSDAT crafts perturbations in the low-dimensional subspace formed by the sparse component of the input sample and that of an adversarial sample to obtain query-efficiency. The specific perturbation of interest is obtained by traversing the path between the input and adversarial sparse components. It is set forth that the proposed sparse perturbation is the most aligned sparse perturbation with the shortest path from the input sample to the decision boundary for some initial adversarial sample (the best sparse approximation of shortest path, likely to fool the model). Theoretical analyses are provided to justify the functionality of LSDAT. Unlike other dimensionality reduction based techniques aimed at improving query efficiency (e.g, ones based on FFT), LSD works directly in the image pixel domain to guarantee that non-ℓ_2 constraints, such as sparsity, are satisfied. LSD offers better control over the number of queries and provides computational efficiency as it performs sparse decomposition of the input and adversarial images only once to generate all queries. We demonstrate ℓ_0, ℓ_2 and ℓ_∞ bounded attacks with LSDAT to evince its efficiency compared to baseline decision-based attacks in diverse low-query budget scenarios as outlined in the experiments.

READ FULL TEXT

page 1

page 3

page 7

research
12/13/2021

Triangle Attack: A Query-efficient Decision-based Adversarial Attack

Decision-based attack poses a severe threat to real-world applications s...
research
03/13/2020

GeoDA: a geometric framework for black-box adversarial attacks

Adversarial examples are known as carefully perturbed images fooling ima...
research
11/08/2021

Geometrically Adaptive Dictionary Attack on Face Recognition

CNN-based face recognition models have brought remarkable performance im...
research
05/08/2020

Projection Probability-Driven Black-Box Attack

Generating adversarial examples in a black-box setting retains a signifi...
research
08/07/2022

Blackbox Attacks via Surrogate Ensemble Search

Blackbox adversarial attacks can be categorized into transfer- and query...
research
09/24/2018

Low Frequency Adversarial Perturbation

Recently, machine learning security has received significant attention. ...
research
07/04/2013

Toward Guaranteed Illumination Models for Non-Convex Objects

Illumination variation remains a central challenge in object detection a...

Please sign up or login with your details

Forgot password? Click here to reset