Adversarial Transfer Attacks with Unknown Data and Class Overlap

dc.contributor.authorRichards, Luke E.
dc.contributor.authorNguyen, André
dc.contributor.authorCapps, Ryan
dc.contributor.authorForsythe, Steven
dc.contributor.authorMatuszek, Cynthia
dc.contributor.authorRaff, Edward
dc.date.accessioned2022-04-21T14:29:54Z
dc.date.available2022-04-21T14:29:54Z
dc.date.issued2021-11-15
dc.descriptionAISec ’21, November 15, 2021, Virtual Event, Republic of Koreaen_US
dc.description.abstractThe ability to transfer adversarial attacks from one model (the surrogate) to another model (the victim) has been an issue of concern within the machine learning (ML) community. The ability to successfully evade unseen models represents an uncomfortable level of ease toward implementing attacks. In this work we note that as studied, current transfer attack research has an unrealistic advantage for the attacker: the attacker has the exact same training data as the victim. We present the first study of transferring adversarial attacks focusing on the data available to attacker and victim under imperfect settings without querying the victim, where there is some variable level of overlap in the exact data used or in the classes learned by each model. This threat model is relevant to applications in medicine, malware, and others. Under this new threat model attack success rate is not correlated with data or class overlap in the way one would expect, and varies with dataset. This makes it difficult for attacker and defender to reason about each other and contributes to the broader study of model robustness and security. We remedy this by developing a masked version of Projected Gradient Descent that simulates class disparity, which enables the attacker to reliably estimate a lower-bound on their attack's success.en_US
dc.description.urihttps://dl.acm.org/doi/abs/10.1145/3474369.3486862en_US
dc.format.extent12 pagesen_US
dc.genreconference papers and proceedingsen_US
dc.identifierdoi:10.13016/m2qy0t-fbbz
dc.identifier.citationLuke E. Richards, André Nguyen, Ryan Capps, Steven Forsyth, Cynthia Matuszek, and Edward Raff. 2021. Adversarial Transfer Attacks With Unknown Data and Class Overlap. In Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security (AISec '21). Association for Computing Machinery, New York, NY, USA, 13–24. https://doi.org/10.1145/3474369.3486862en_US
dc.identifier.urihttps://doi.org/10.1145/3474369.3486862
dc.identifier.urihttp://hdl.handle.net/11603/24608
dc.language.isoen_USen_US
dc.publisherACMen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.en_US
dc.subjectUMBC Interactive Robotics and Language Lab
dc.titleAdversarial Transfer Attacks with Unknown Data and Class Overlapen_US
dc.typeTexten_US
dcterms.creatorhttps://orcid.org/0000-0003-1383-8120

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
3474369.3486862.pdf
Size:
5.47 MB
Format:
Adobe Portable Document Format
Description:
Main Article
No Thumbnail Available
Name:
AISec21-richards-AdvTransferDataCentric.mp4
Size:
254.48 MB
Format:
Unknown data format
Description:
mp4 file

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: