On Single-Model Transferable Targeted Attacks: A Closer Look at Decision-Level Optimization

Xuxiang Sun, Gong Cheng, Hongda Li, Lei Pei, Junwei Han

科研成果: 期刊稿件文章同行评审

12 引用 (Scopus)

摘要

Known as a hard nut, the single-model transferable targeted attacks via decision-level optimization objectives have attracted much attention among scholars for a long time. On this topic, recent works devoted themselves to designing new optimization objectives. In contrast, we take a closer look at the intrinsic problems in three commonly adopted optimization objectives, and propose two simple yet effective methods in this paper to mitigate these intrinsic problems. Specifically, inspired by the basic idea of adversarial learning, we, for the first time, propose a unified Adversarial Optimization Scheme (AOS) to release both the problems of gradient vanishing in cross-entropy loss and gradient amplification in Po+Trip loss, and indicate that our AOS, a simple transformation on the output logits before passing them to the objective functions, can yield considerable improvements on the targeted transferability. Besides, we make a further clarification on the preliminary conjecture in Vanilla Logit Loss (VLL) and point out the problem of unbalanced optimization in VLL, in which the source logit may risk getting increased without the explicit suppression on it, leading to the low transferability. Then, the Balanced Logit Loss (BLL) is further proposed, where we take both the source logit and the target logit into account. Comprehensive validations witness the compatibility and the effectiveness of the proposed methods across most attack frameworks, and their effectiveness can also span two tough cases (i.e., the low-ranked transfer scenario and the transfer to defense methods) and three datasets (i.e., the ImageNet, CIFAR-10, and CIFAR-100). Our source code is available at https://github.com/xuxiangsun/DLLTTAA.

源语言英语
页(从-至)2972-2984
页数13
期刊IEEE Transactions on Image Processing
32
DOI
出版状态已出版 - 2023

指纹

探究 'On Single-Model Transferable Targeted Attacks: A Closer Look at Decision-Level Optimization' 的科研主题。它们共同构成独一无二的指纹。

引用此