• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhang, H. (Zhang, H..) [1] | Li, X. (Li, X..) [2] | Tang, J. (Tang, J..) [3] | Peng, C. (Peng, C..) [4] | Wang, Y. (Wang, Y..) [5] | Zhang, N. (Zhang, N..) [6] | Miao, Y. (Miao, Y..) [7] | Liu, X. (Liu, X..) [8] (Scholars:刘西蒙) | Choo, K.R. (Choo, K.R..) [9]

Indexed by:

Scopus

Abstract:

Deep Convolution Neural Networks (CNNs) have become the cornerstone of image classification, but the emergence of adversarial image attacks brings serious security risks to CNN-based applications. As a local perturbation attack, the border attack can achieve high success rates by only modifying the pixels around the border of an image, which is a novel attack perspective. However, existing border attacks have shortcomings in stealthiness and are easily detected. In this paper, we propose a novel stealthy border attack method based on deep feature alignment. Specifically, we propose a deep feature alignment algorithm based on style transfer to guarantee the stealthiness of adversarial borders. The algorithm takes the deep feature difference between the adversarial and the original borders as the stealthiness loss and thus ensures good stealthiness of the generated adversarial images. To ensure high attack success rates simultaneously, we apply cross entropy to design the targeted attack loss and use margin loss as well as Leaky ReLU to design the untargeted attack loss. Experiments show that the structural similarity between the generated adversarial images and the original images is 8.8% higher than the state-of-art border attack method, indicating that our proposed adversarial images have better stealthiness. At the same time, the success rate of our attack in the face of defense methods is much higher, which is about four times that of the state-of-art border attack under the adversarial training defense. IEEE

Keyword:

adversarial attack CNN stealthiness visual fidelity

Community:

  • [ 1 ] [Zhang H.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi’an, China
  • [ 2 ] [Li X.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi’an, China
  • [ 3 ] [Tang J.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi’an, China
  • [ 4 ] [Peng C.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi’an, China
  • [ 5 ] [Wang Y.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi’an, China
  • [ 6 ] [Zhang N.]Department of Computer Science and Engineering, Washington University in St. Louis, St. Louis, MO, USA
  • [ 7 ] [Miao Y.]State Key Laboratory of Integrated Services Networks, and the School of Cyber Engineering, Xidian University, Xi’an, China
  • [ 8 ] [Liu X.]College of Computer and Data Science, Fuzhou University, Fuzhou, China
  • [ 9 ] [Choo K.R.]Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA

Reprint 's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Computers

ISSN: 0018-9340

Year: 2024

Issue: 10

Volume: 73

Page: 1-14

3 . 6 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 4

Online/Total:283/9761916
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1