HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets

  • Qi Li
  • , Xingyu Li
  • , Xiaodong Cui
  • , Keke Tang
  • , Peican Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Exploring adversarial attacks on deep neural networks (DNNs) is crucial for assessing and enhancing their adversarial robustness. Among various attack types, hard-label attacks that rely only on predicted labels offer a practical approach. This paper focuses on the challenging task of hard-label attacks within an extremely limited query budget, which is a significant achievement rarely accomplished by existing methods. To tackle this, we propose an attack framework that leverages geometric information from previous perturbation directions to form triangles and employs a heuristic perpendicular trial to effectively utilize the intermediate directions. Extensive experiments validate the effectiveness of our approach under strict query constraints and demonstrate its superiority to the state-of-the-art methods.

Original languageEnglish
Title of host publicationCIKM 2023 - Proceedings of the 32nd ACM International Conference on Information and Knowledge Management
PublisherAssociation for Computing Machinery
Pages4064-4068
Number of pages5
ISBN (Electronic)9798400701245
DOIs
StatePublished - 21 Oct 2023
Event32nd ACM International Conference on Information and Knowledge Management, CIKM 2023 - Birmingham, United Kingdom
Duration: 21 Oct 202325 Oct 2023

Publication series

NameInternational Conference on Information and Knowledge Management, Proceedings
ISSN (Print)2155-0751

Conference

Conference32nd ACM International Conference on Information and Knowledge Management, CIKM 2023
Country/TerritoryUnited Kingdom
CityBirmingham
Period21/10/2325/10/23

Keywords

  • deep neural networks
  • hard-label adversarial attack
  • trustworthy machine learning

Fingerprint

Dive into the research topics of 'HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets'. Together they form a unique fingerprint.

Cite this