Abstract
Developing techniques for adversarial attack and defense is an important research field for establishing reliable machine learning and its applications. Many existing methods employ Gaussian random variables for exploring the data space to find the most adversarial (for attacking) or least adversarial (for defense) point. However, the Gaussian distribution is not necessarily the optimal choice when the exploration is required to follow the complicated structure that most real-world data distributions exhibit. In this paper, we investigate how statistics of random variables affect such random walk exploration. Specifically, we generalize the Boundary Attack, a state-of-the-art blackbox decision based attacking strategy, and propose the Lévy-Attack, where the random walk is driven by symmetric α-stable random variables. Our experiments on MNIST and CIFAR10 datasets show that the Lévy-Attack explores the image data space more efficiently, and significantly improves the performance. Our results also give an insight into the recently found fact in the whitebox attacking scenario that the choice of the norm for measuring the amplitude of the adversarial patterns is essential.
| Original language | English |
|---|---|
| Title of host publication | EUSIPCO 2019 - 27th European Signal Processing Conference |
| Publisher | European Signal Processing Conference, EUSIPCO |
| ISBN (Electronic) | 9789082797039 |
| DOIs | |
| Publication status | Published - 2019 Sept |
| Event | 27th European Signal Processing Conference, EUSIPCO 2019 - A Coruna, Spain Duration: 2019 Sept 2 → 2019 Sept 6 |
Publication series
| Name | European Signal Processing Conference |
|---|---|
| Volume | 2019-September |
| ISSN (Print) | 2219-5491 |
Conference
| Conference | 27th European Signal Processing Conference, EUSIPCO 2019 |
|---|---|
| Country/Territory | Spain |
| City | A Coruna |
| Period | 19/9/2 → 19/9/6 |
Bibliographical note
Funding Information:E.E.Kuruoglu’s stay in Fraunhofer HHI was funded by CNR Short Term Mobility Program.
Funding Information:
This work was supported by the German Ministry for Education and Research as Berlin Big Data Center BBDC (funding mark 01IS18025A) and Berlin Center for Machine Learning BZML (funding mark 01IS18037I). The work of K.-R. Müller was supported by the Institute for Information and Communications Technology Promotion Grant funded by the Korea government (MSIT) (No. 2017-00451, No. 2017-0-01779).
Funding Information:
This work was supported by the German Ministry for Education and Research as Berlin Big Data Center BBDC (funding mark 01IS18025A) and Berlin Center for Machine Learning BZML (funding mark 01IS18037I). The work of K.-R. M?ller was supported by the Institute for Information and Communications Technology Promotion Grant funded by the Korea government (MSIT) (No. 2017-00451, No. 2017-0-01779). E.E.Kuruoglu's stay in Fraunhofer HHI was funded by CNR Short Term Mobility Program.
Publisher Copyright:
© 2019 IEEE
Keywords
- Adversarial attack
- Deep neural networks
- Image classification
- α-stable distribution
ASJC Scopus subject areas
- Signal Processing
- Electrical and Electronic Engineering