Cargando…
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbatio...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Frontiers Media S.A.
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9947527/ https://www.ncbi.nlm.nih.gov/pubmed/36845066 http://dx.doi.org/10.3389/fnbot.2023.1129720 |
_version_ | 1784892575456428032 |
---|---|
author | Liu, Renyang Jin, Xin Hu, Dongting Zhang, Jinhong Wang, Yuanyu Zhang, Jin Zhou, Wei |
author_facet | Liu, Renyang Jin, Xin Hu, Dongting Zhang, Jinhong Wang, Yuanyu Zhang, Jin Zhou, Wei |
author_sort | Liu, Renyang |
collection | PubMed |
description | Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbations by L(p)-norm. Resulting that the perturbations generated by these methods can be easily detected by defense mechanisms and are easily perceptible to the human visual system (HVS). To circumvent the former problem, we propose a novel framework, called DualFlow, to craft adversarial examples by disturbing the image's latent representations with spatial transform techniques. In this way, we are able to fool classifiers with human imperceptible adversarial examples and step forward in exploring the existing DNN's fragility. For imperceptibility, we introduce the flow-based model and spatial transform strategy to ensure the calculated adversarial examples are perceptually distinguishable from the original clean images. Extensive experiments on three computer vision benchmark datasets (CIFAR-10, CIFAR-100 and ImageNet) indicate that our method can yield superior attack performance in most situations. Additionally, the visualization results and quantitative performance (in terms of six different metrics) show that the proposed method can generate more imperceptible adversarial examples than the existing imperceptible attack methods. |
format | Online Article Text |
id | pubmed-9947527 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Frontiers Media S.A. |
record_format | MEDLINE/PubMed |
spelling | pubmed-99475272023-02-24 DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model Liu, Renyang Jin, Xin Hu, Dongting Zhang, Jinhong Wang, Yuanyu Zhang, Jin Zhou, Wei Front Neurorobot Neuroscience Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbations by L(p)-norm. Resulting that the perturbations generated by these methods can be easily detected by defense mechanisms and are easily perceptible to the human visual system (HVS). To circumvent the former problem, we propose a novel framework, called DualFlow, to craft adversarial examples by disturbing the image's latent representations with spatial transform techniques. In this way, we are able to fool classifiers with human imperceptible adversarial examples and step forward in exploring the existing DNN's fragility. For imperceptibility, we introduce the flow-based model and spatial transform strategy to ensure the calculated adversarial examples are perceptually distinguishable from the original clean images. Extensive experiments on three computer vision benchmark datasets (CIFAR-10, CIFAR-100 and ImageNet) indicate that our method can yield superior attack performance in most situations. Additionally, the visualization results and quantitative performance (in terms of six different metrics) show that the proposed method can generate more imperceptible adversarial examples than the existing imperceptible attack methods. Frontiers Media S.A. 2023-02-09 /pmc/articles/PMC9947527/ /pubmed/36845066 http://dx.doi.org/10.3389/fnbot.2023.1129720 Text en Copyright © 2023 Liu, Jin, Hu, Zhang, Wang, Zhang and Zhou. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. |
spellingShingle | Neuroscience Liu, Renyang Jin, Xin Hu, Dongting Zhang, Jinhong Wang, Yuanyu Zhang, Jin Zhou, Wei DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model |
title | DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model |
title_full | DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model |
title_fullStr | DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model |
title_full_unstemmed | DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model |
title_short | DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model |
title_sort | dualflow: generating imperceptible adversarial examples by flow field and normalize flow-based model |
topic | Neuroscience |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9947527/ https://www.ncbi.nlm.nih.gov/pubmed/36845066 http://dx.doi.org/10.3389/fnbot.2023.1129720 |
work_keys_str_mv | AT liurenyang dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel AT jinxin dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel AT hudongting dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel AT zhangjinhong dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel AT wangyuanyu dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel AT zhangjin dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel AT zhouwei dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel |