Improving adversarial transferability through hybrid augmentation

Peican Zhu, Zepeng Fan, Sensen Guo, Keke Tang, Xingyu Li

Research output: Contribution to journalArticlepeer-review

12 Scopus citations

Abstract

Many works have shown that the adversarial examples being generated on a known substitute model have the ability to mislead other unknown black-box models, which has attracted widespread attention. Recently, many model augmentation methods have been presented to boost the corresponding transferability of adversarial examples by transforming the images to simulate diverse models for attack. However, existing model augmentation methods focus on the transformations in a single domain and may restrict the diversity of simulated models. To overcome this limitation, we present a novel model augmentation method named Hybrid Augmentation Method (HAM). Our approach comprises two components, channel-wise scaling (CS) and spectrum masking (SM). Specifically, we first transform the images with CS in the spatial domain, which enhances the diversity of transformed images by randomly scaling the channel. Then we apply SM to randomly remove some frequency information of the images in the frequency domain, further increasing the diversity of the transformed images. Instead of confining the transformations in a single domain, we take transformations both in the spatial and frequency domain simultaneously. This enables us to get more various transformed images and largely increases the diversity of simulated models to create more powerful adversarial examples. We conduct extensive experiments to demonstrate the superiority of our method on both undefended and defense models, which largely outperforms the considered attacks. Moreover, our method can be integrated with other attacks to further enhance the adversarial transferability.

Original languageEnglish
Article number103674
JournalComputers and Security
Volume139
DOIs
StatePublished - Apr 2024

Keywords

  • Adversarial examples
  • Adversarial transferability
  • Deep neural networks
  • Model augmentation
  • Transfer-based attacks

Fingerprint

Dive into the research topics of 'Improving adversarial transferability through hybrid augmentation'. Together they form a unique fingerprint.

Cite this