UM  > Faculty of Science and Technology
Residential Collegefalse
Status已發表Published
Efficient physical image attacks using adversarial fast autoaugmentation methods
Du, Xia1,2,3; Pun, Chi Man2; Zhou, Jizhe3
2024-11-25
Source PublicationKnowledge-Based Systems
ISSN0950-7051
Volume304Pages:112576
Abstract

Deep learning systems have been shown to be vulnerable to adversarial examples, but most existing works focus on manipulating and attacking images in the digital domain. Although some recent research has proposed physical attacks using Expectation Over Transformation (EoT) methods, these approaches are limited to specific classifiers and often require a significant amount of sample collection, posing challenges for efficient utilization. In this paper, we address these issues by introducing the Adversarial Fast Autoaugmentation (AFA) method, which streamlines the process of collecting training samples, thereby alleviating the sample collection pressure. We further propose the AFA-based multi-sample ensemble method (AFA-MSEM) and AFA-based most-likely ensemble method (AFA-MLEM) to achieve adversarial attacks that effectively deceive classifiers in both the digital and real-world scenario. Additionally, our adaptive norm algorithm enables the crafting of faster and smaller perturbations compared to state-of-the-art attack methods. Moreover, our proposed AFA-MLEM, extended with a weighted objective function, is capable of generating robust adversarial examples that can simultaneously mislead multiple classifiers (Inception-v3, Inception-v4, ResNet-v2, and Inception-ResNet-v2) in real-world scenarios. Experimental results demonstrate that our adversarial attack can achieve higher success rates and exhibit resilience against multi-model defense systems, outperforming other existing methods. Overall, our proposed adversarial attack methods offer improved effectiveness, efficiency, and robustness, making them valuable contributions to the field of adversarial attacks in deep learning systems.

KeywordAdversarial Robust Attacks Autoaugmentation Computer Vision Ensemble Method
DOI10.1016/j.knosys.2024.112576
URLView the original
Indexed BySCIE
Language英語English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Artificial Intelligence
WOS IDWOS:001333011500001
PublisherELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS
Scopus ID2-s2.0-85205555734
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionFaculty of Science and Technology
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Corresponding AuthorPun, Chi Man
Affiliation1.School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, 361024, China
2.Department of Computer and Information Science, University of Macau, 999078, Macao
3.Engineering Research Center of Machine Learning and Industry Intelligence, Ministry of Education, Sichuan University, Chengdu, 610065, China
First Author AffilicationUniversity of Macau
Corresponding Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Du, Xia,Pun, Chi Man,Zhou, Jizhe. Efficient physical image attacks using adversarial fast autoaugmentation methods[J]. Knowledge-Based Systems, 2024, 304, 112576.
APA Du, Xia., Pun, Chi Man., & Zhou, Jizhe (2024). Efficient physical image attacks using adversarial fast autoaugmentation methods. Knowledge-Based Systems, 304, 112576.
MLA Du, Xia,et al."Efficient physical image attacks using adversarial fast autoaugmentation methods".Knowledge-Based Systems 304(2024):112576.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Du, Xia]'s Articles
[Pun, Chi Man]'s Articles
[Zhou, Jizhe]'s Articles
Baidu academic
Similar articles in Baidu academic
[Du, Xia]'s Articles
[Pun, Chi Man]'s Articles
[Zhou, Jizhe]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Du, Xia]'s Articles
[Pun, Chi Man]'s Articles
[Zhou, Jizhe]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.