Improving Transferability of Adversarial Examples by Saliency Distribution and Data Augmentation

Yansong Dong,Long Tang,Cong Tian,Bin Yu,Zhenhua Duan
DOI: https://doi.org/10.1016/j.cose.2022.102811
IF: 5.105
2022-01-01
Computers & Security
Abstract:Although deep neural networks (DNNs) have advanced performance in many application scenarios, they are vulnerable to the attacks of adversarial examples that are crafted by adding imperceptible perturbations. Most of the existing adversarial attacks rely on the structure and parameters information of the attacked network. Thus, the generated adversarial examples are poor in transferability to attack blackbox defense models, which makes them difficult to be used in real-world applications. In this paper, we propose an approach based on saliency distribution and data augmentation to generate transferable adversarial examples against the defense models. By optimizing perturbations over non-saliency regions, the generated adversarial examples are less sensitive to the attacked source models and have better transferability. Further, by utilizing data augmentation in generating adversarial examples, the overfitting problem on source models is alleviated in targeted attacks. Extensive experiments show that the proposed approach can generate adversarial examples with higher transferability. The source code is available at https://github.com/dongysxd/SDM- FGSM- Attack .
What problem does this paper attempt to address?