论文标题
采取良好的做法来评估转移对抗攻击
Towards Good Practices in Evaluating Transfer Adversarial Attacks
论文作者
论文摘要
转移对抗性攻击引起了现实世界中的黑盒情景的关键安全问题。但是,由于现有评估中有两个共同的局限性,因此很难评估该领域的实际进度。首先,在一对一的比较中通常不会系统地和公平地评估不同的方法。其次,仅评估可转移性,但在很大程度上被忽略了另一个关键攻击属性,即隐形。在这项工作中,我们设计了良好的实践来解决这些局限性,并对转移攻击进行了首次全面评估,涵盖了对Imagenet上9条防御的23次代表性攻击。特别是,我们建议将现有攻击分为五个类别,从而使我们的系统类别分析。这些分析导致了新发现,甚至可以挑战现有知识,还有助于确定攻击综合评估的最佳攻击超参数。我们还通过采用多样化的不可识别指标并研究了新的,更精细的粒度特征来特别关注隐形。总体而言,我们对可转移性和隐身性的新见解为将来的评估带来了可行的良好实践。
Transfer adversarial attacks raise critical security concerns in real-world, black-box scenarios. However, the actual progress of this field is difficult to assess due to two common limitations in existing evaluations. First, different methods are often not systematically and fairly evaluated in a one-to-one comparison. Second, only transferability is evaluated but another key attack property, stealthiness, is largely overlooked. In this work, we design good practices to address these limitations, and we present the first comprehensive evaluation of transfer attacks, covering 23 representative attacks against 9 defenses on ImageNet. In particular, we propose to categorize existing attacks into five categories, which enables our systematic category-wise analyses. These analyses lead to new findings that even challenge existing knowledge and also help determine the optimal attack hyperparameters for our attack-wise comprehensive evaluation. We also pay particular attention to stealthiness, by adopting diverse imperceptibility metrics and looking into new, finer-grained characteristics. Overall, our new insights into transferability and stealthiness lead to actionable good practices for future evaluations.