Black-box Adversarial Attacks with Limited Queries and Information

04/23/2018
by   Andrew Ilyas, et al.
0

Current neural network-based classifiers are susceptible to adversarial examples even in the black-box setting, where the attacker only has query access to the model. In practice, the threat model for real-world systems is often more restrictive than the typical black-box model of full query access. We define three realistic threat models that more accurately characterize many real-world classifiers: the query-limited setting, the partial-information setting, and the label-only setting. We develop new attacks that fool classifiers under these more restrictive threat models, where previous methods would be impractical or ineffective. We demonstrate that our methods are effective against an ImageNet classifier under our proposed threat models. We also demonstrate a targeted black-box attack against a commercial classifier, overcoming the challenges of limited query access, partial information, and other practical issues to attack the Google Cloud Vision API.

READ FULL TEXT
research
12/19/2017

Query-Efficient Black-box Adversarial Examples

Current neural network-based image classifiers are susceptible to advers...
research
08/24/2022

Unrestricted Black-box Adversarial Attack Using GAN with Limited Queries

Adversarial examples are inputs intentionally generated for fooling a de...
research
08/16/2020

TextDecepter: Hard Label Black Box Attack on Text Classifiers

Machine learning has been proven to be susceptible to carefully crafted ...
research
10/28/2022

Distributed Black-box Attack against Image Classification Cloud Services

Black-box adversarial attacks can fool image classifiers into misclassif...
research
06/08/2019

Making targeted black-box evasion attacks effective and efficient

We investigate how an adversary can optimally use its query budget for t...
research
04/01/2020

Evading Deepfake-Image Detectors with White- and Black-Box Attacks

It is now possible to synthesize highly realistic images of people who d...
research
03/06/2023

A Systematic Approach to Automotive Security

We propose a holistic methodology for designing automotivesystems that c...

Please sign up or login with your details

Forgot password? Click here to reset