作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2021, Vol. 47 ›› Issue (8): 162-169. doi: 10.19678/j.issn.1000-3428.0059105

• 网络空间安全 • 上一篇    下一篇

基于模型间迁移性的黑盒对抗攻击起点提升方法

陈晓楠1, 胡建敏1, 张本俊2, 陈爱玲3   

  1. 1. 国防大学 联合勤务学院, 北京 100089;
    2. 南京航空航天大学 电子信息工程学院, 南京 211100;
    3. 山东省烟台市实验中学, 山东 烟台 265500
  • 收稿日期:2020-07-30 修回日期:2020-09-16 发布日期:2020-09-16
  • 作者简介:陈晓楠(1991-),男,硕士研究生,主研方向为联合勤务管理、智能后勤;胡建敏,教授、博士生导师;张本俊,硕士研究生;陈爱玲,学士。
  • 基金资助:
    全军军事类研究生重点资助课题(JY2019B041,JY2020B037);全军军事理论重点课题(20GDJ2651B)。

Black Box Adversarial Attack Starting Point Promotion Method Based on Mobility Between Models

CHEN Xiaonan1, HU Jianmin1, ZHANG Benjun2, CHEN Ailing3   

  1. 1. Joint Logistics College, National Defense University, Beijing 100089, China;
    2. College of Electronic Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211100, China;
    3. Yantai Experimental Middle School of Shandong Province, Yantai, Shandong 265500, China
  • Received:2020-07-30 Revised:2020-09-16 Published:2020-09-16

摘要: 为高效地寻找基于决策的黑盒攻击下的对抗样本,提出一种利用模型之间的迁移性提升对抗起点的方法。通过模型之间的迁移性来循环叠加干扰图像,生成初始样本作为新的攻击起点进行边界攻击,实现基于决策的无目标黑盒对抗攻击和有目标黑盒对抗攻击。实验结果表明,无目标攻击节省了23%的查询次数,有目标攻击节省了17%的查询次数,且整个黑盒攻击算法所需时间低于原边界攻击算法所耗费的时间。

关键词: 黑盒攻击, 对抗样本, 迁移性, 初始样本, 边界攻击, 无目标攻击, 有目标攻击

Abstract: In order to efficiently find the adversarial samples under the decision-based black box attacks, a method using the mobility between models is proposed to enhance the adversarial starting point. The mobility is used to circularly superimpose interference images, and samples are generated as a new starting point for boundary attacks. Thus the decision making-based non-target adversarial black box attacks and targeted adversarial black box attacks are realized. Experimental results show that the query times required for the non-target attacks is reduced by 23%, and that required for the targeted attacks is reduced by 17%. Moreover, the whole black box attack algorithm takes less time than the original boundary attack algorithm.

Key words: black box attack, adversarial sample, mobility, initial sample, boundary attack, non-target attack, targeted attack

中图分类号: