Black-box Adversarial Attacks with Bayesian Optimization

09/30/2019
by   Satya Narayan Shukla, et al.
0

We focus on the problem of black-box adversarial attacks, where the aim is to generate adversarial examples using information limited to loss function evaluations of input-output pairs. We use Bayesian optimization (BO) to specifically cater to scenarios involving low query budgets to develop query efficient adversarial attacks. We alleviate the issues surrounding BO in regards to optimizing high dimensional deep learning models by effective dimension upsampling techniques. Our proposed approach achieves performance comparable to the state of the art black-box adversarial attacks albeit with a much lower average query count. In particular, in low query budget regimes, our proposed method reduces the query count up to 80% with respect to the state of the art methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2020

Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes

We focus on the problem of black-box adversarial attacks, where the aim ...
research
06/17/2022

Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization

We focus on the problem of adversarial attacks against models on discret...
research
04/27/2023

Network Cascade Vulnerability using Constrained Bayesian Optimization

Measures of power grid vulnerability are often assessed by the amount of...
research
07/20/2018

Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

We introduce a framework that unifies the existing work on black-box adv...
research
12/23/2017

Query-limited Black-box Attacks to Classifiers

We study black-box attacks on machine learning classifiers where each qu...
research
10/08/2020

Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks

We study the problem of generating adversarial examples in a black-box s...
research
05/17/2019

Simple Black-box Adversarial Attacks

We propose an intriguingly simple method for the construction of adversa...

Please sign up or login with your details

Forgot password? Click here to reset