###
计算机系统应用英文版:2020,29(12):216-221
本文二维码信息
码上扫一扫!
基于快速边界攻击的黑盒对抗样本生成方法
(大连东软信息学院 智能与电子工程学院, 大连 116023)
Black Box Adversarial Examples Generation Method Based on Fast Boundary Attack
(School of Intelligence and Electronic Engineering, Dalian Neusoft University of Information, Dalian 116023, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 1006次   下载 2409
Received:April 09, 2020    Revised:May 10, 2020
中文摘要: 深度学习技术在不同领域有着广泛的应用, 然而一个训练好的深度学习模型很容易受到干扰而得出错误的结果, 从而引发严重的安全问题. 为了检验深度学习模型的抗干扰性, 提高模型的安全性和鲁棒性, 有必要使用对抗样本进行对抗评估和对抗训练. 有目标的黑盒对抗样本的生成方法具有较好的实用性, 是该领域的研究热点之一. 有目标的黑盒对抗样本生成的难点在于, 如何在保证攻击成功率的前提下提高对抗样本的生成效率. 为了解决这一难点, 本文提出了一种基于快速边界攻击的有目标攻击样本生成方法. 该方法包括线上的搜索和面上的搜索两步. 线上的搜索由单侧折半法来完成, 用于提高搜索效率; 面上的搜索通过自适应调节搜索半径的随机搜索完成, 用于提高搜索的广度. 通过对5组图片的实验结果验证了方法的可行性.
中文关键词: 黑盒攻击  对抗样本  深度学习
Abstract:Deep learning is widely used in different fields. However, a well-trained deep learning model may be easily disturbed and gives wrong results, which causes serious safety problems. In order to test the robustness of deep learning model, researchers attack the model by all kinds of adversarial examples. The generation method of black box adversarial examples with targets, which has sound practicability, becomes a hot issue. The difficulty of black box adversarial examples generation lies in how to improve the generation efficiency under the premise of the success rate of the attack. In order to solve this difficulty, this study proposes a new method of target adversarial sample generation based on fast boundary attack. This method includes two steps: sampling along the line and sampling on the sphere. The first step is completed by the one side half search to improve search efficiency. The second step is completed by random search with adaptive adjustment of search radius, which is used to improve the search scope. The feasibility of the algorithm is verified by experimental results of five groups of pictures.
文章编号:     中图分类号:    文献标志码:
基金项目:
引用文本:
郭书杰.基于快速边界攻击的黑盒对抗样本生成方法.计算机系统应用,2020,29(12):216-221
GUO Shu-Jie.Black Box Adversarial Examples Generation Method Based on Fast Boundary Attack.COMPUTER SYSTEMS APPLICATIONS,2020,29(12):216-221