skip to main content
10.1145/3522749.3523078acmotherconferencesArticle/Chapter ViewAbstractPublication PagescceaiConference Proceedingsconference-collections
research-article

Fourier attack – a more efficient adversarial attack method

Authors Info & Claims
Published:13 April 2022Publication History

ABSTRACT

As neural networks have made remarkable achievements in the field of image classification, a variety of adversarial attack methods have appeared to interfere with neural networks. Adversarial samples apply a tiny perturbation to the original image, which would not make much sense to the human eye, but would produce a massive error to the neural network. In recent years, many articles have made contributions to adversarial sample attack and defense, which aim to generate a maximum classification error while minimizing the perturbation. However, former attacks are focused on the spatial domain. We find that separated attacks based on different components in the frequency domain are more effective. The contribution of this article is: (1) compute the gradient of the neural network for image classification after the discrete Fourier transform. (2) design a stationary filter to generate the adversarial sample according to frequency component and gradient. (3) conduct experiments show that the adverasial samples generated by our method achieve the same attack effect on the premise that they are closer to the original picture.

References

  1. LeCun Y, Boser B, Denker J S, Backpropagation applied to handwritten zip code recognition[J]. Neural computation, 1989, 1(4): 541-551.Google ScholarGoogle Scholar
  2. Goodfellow I J, Shlens J, Szegedy C. Explaining and harnessing adversarial examples[J]. arXiv preprint arXiv:1412.6572, 2014.Google ScholarGoogle Scholar
  3. Madry A, Makelov A, Schmidt L, Towards deep learning models resistant to adversarial attacks[J]. arXiv preprint arXiv:1706.06083, 2017.Google ScholarGoogle Scholar
  4. Boeddeker C, Hanebrink P, Drude L, On the computation of complex-valued gradients with application to statistically optimum beamforming[J]. arXiv preprint arXiv:1701.00392, 2017.Google ScholarGoogle Scholar
  5. Dong Y, Liao F, Pang T, Boosting adversarial attacks with momentum[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2018: 9185-9193.Google ScholarGoogle Scholar
  6. Moosavi-Dezfooli S M, Fawzi A, Frossard P. Deepfool: a simple and accurate method to fool deep neural networks[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 2574-2582.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    CCEAI '22: Proceedings of the 6th International Conference on Control Engineering and Artificial Intelligence
    March 2022
    130 pages
    ISBN:9781450385916
    DOI:10.1145/3522749

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 April 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)4

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format