Cargando…

DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model

Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbatio...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Renyang, Jin, Xin, Hu, Dongting, Zhang, Jinhong, Wang, Yuanyu, Zhang, Jin, Zhou, Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Frontiers Media S.A. 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9947527/
https://www.ncbi.nlm.nih.gov/pubmed/36845066
http://dx.doi.org/10.3389/fnbot.2023.1129720
_version_ 1784892575456428032
author Liu, Renyang
Jin, Xin
Hu, Dongting
Zhang, Jinhong
Wang, Yuanyu
Zhang, Jin
Zhou, Wei
author_facet Liu, Renyang
Jin, Xin
Hu, Dongting
Zhang, Jinhong
Wang, Yuanyu
Zhang, Jin
Zhou, Wei
author_sort Liu, Renyang
collection PubMed
description Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbations by L(p)-norm. Resulting that the perturbations generated by these methods can be easily detected by defense mechanisms and are easily perceptible to the human visual system (HVS). To circumvent the former problem, we propose a novel framework, called DualFlow, to craft adversarial examples by disturbing the image's latent representations with spatial transform techniques. In this way, we are able to fool classifiers with human imperceptible adversarial examples and step forward in exploring the existing DNN's fragility. For imperceptibility, we introduce the flow-based model and spatial transform strategy to ensure the calculated adversarial examples are perceptually distinguishable from the original clean images. Extensive experiments on three computer vision benchmark datasets (CIFAR-10, CIFAR-100 and ImageNet) indicate that our method can yield superior attack performance in most situations. Additionally, the visualization results and quantitative performance (in terms of six different metrics) show that the proposed method can generate more imperceptible adversarial examples than the existing imperceptible attack methods.
format Online
Article
Text
id pubmed-9947527
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Frontiers Media S.A.
record_format MEDLINE/PubMed
spelling pubmed-99475272023-02-24 DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model Liu, Renyang Jin, Xin Hu, Dongting Zhang, Jinhong Wang, Yuanyu Zhang, Jin Zhou, Wei Front Neurorobot Neuroscience Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively loose noise budget, i.e., limit the perturbations by L(p)-norm. Resulting that the perturbations generated by these methods can be easily detected by defense mechanisms and are easily perceptible to the human visual system (HVS). To circumvent the former problem, we propose a novel framework, called DualFlow, to craft adversarial examples by disturbing the image's latent representations with spatial transform techniques. In this way, we are able to fool classifiers with human imperceptible adversarial examples and step forward in exploring the existing DNN's fragility. For imperceptibility, we introduce the flow-based model and spatial transform strategy to ensure the calculated adversarial examples are perceptually distinguishable from the original clean images. Extensive experiments on three computer vision benchmark datasets (CIFAR-10, CIFAR-100 and ImageNet) indicate that our method can yield superior attack performance in most situations. Additionally, the visualization results and quantitative performance (in terms of six different metrics) show that the proposed method can generate more imperceptible adversarial examples than the existing imperceptible attack methods. Frontiers Media S.A. 2023-02-09 /pmc/articles/PMC9947527/ /pubmed/36845066 http://dx.doi.org/10.3389/fnbot.2023.1129720 Text en Copyright © 2023 Liu, Jin, Hu, Zhang, Wang, Zhang and Zhou. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
spellingShingle Neuroscience
Liu, Renyang
Jin, Xin
Hu, Dongting
Zhang, Jinhong
Wang, Yuanyu
Zhang, Jin
Zhou, Wei
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
title DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
title_full DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
title_fullStr DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
title_full_unstemmed DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
title_short DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
title_sort dualflow: generating imperceptible adversarial examples by flow field and normalize flow-based model
topic Neuroscience
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9947527/
https://www.ncbi.nlm.nih.gov/pubmed/36845066
http://dx.doi.org/10.3389/fnbot.2023.1129720
work_keys_str_mv AT liurenyang dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel
AT jinxin dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel
AT hudongting dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel
AT zhangjinhong dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel
AT wangyuanyu dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel
AT zhangjin dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel
AT zhouwei dualflowgeneratingimperceptibleadversarialexamplesbyflowfieldandnormalizeflowbasedmodel