SAIF: Sparse Adversarial and Imperceptible Attack Framework
摘要
评审与讨论
The paper proposed Sparse Adversarial and Imperceptible Attack Framework (SAIF) to generate adversarial images while simultaneously controlling both the - and -norm of the corresponding perturbations. SAIF relies on Frank-Wolfe algorithms to optimize targeted and untargeted attacks. In the experiments on ImageNet, SAIF is shown effective in several setups and in comparison to existing attacks. Finally, the paper shows that sparse attacks might be more interpretable than dense ones, and find salient pixels in the image.
优点
-
The proposed algorithm to simultaneously optimize the dense perturbation and sparse mask seems overall novel.
-
in the experiments, SAIF is shown to outperform existing attacks on both targeted and untargeted attacks.
缺点
-
It is not clear how the -norm constrain is enforced: in Line 7 of Alg. 1, the sparsity of seems to decrease compared to (unless or and have the non-zero components and the same position). Moreover, the presentation in general could be more clear, e.g. some notation is used before being introduced.
-
The case with is equivalent to a standard -attack: then, I think a comparison to existing attacks (e.g. [A, B, C]) in this threat model should be included. Moreover, some of these attacks, e.g. [C], could be adapted to include bounds in a quite straightforward way, providing further baselines for the setups.
-
Some of the attacks used in the comparison, e.g. PGD , use sparsity constraints in the pixel space, while, if I understand it correctly, SAIF counts color channels individually. It's not clear how this difference, which would make the results of different attacks hardly comparable, is handled. Moreover, PGD is flagged as a black-box attack, while it is a white-box method. Finally, the parameters, e.g. number of iterations, used for the existing methods are not detailed.
-
The attacks are compared only on ResNet-50 and Inception-v3. Including more recent (and effective) architectures, and maybe adversarially trained models, would make the experimental evaluation more complete.
-
The ablation study about removing the sparsity constrain (Sec. 7) doesn't seem to add any valuable insight into the proposed method, since it is known that -bounded attacks perturb (almost) all pixels (which is also suggested by the update step in Eq. (5)).
[A] https://arxiv.org/abs/2006.12834
[B] https://arxiv.org/abs/2102.12827
[C] https://arxiv.org/abs/2106.01538
问题
See weaknesses above.
Overall, the paper lacks, at the moment, clarity in the presentation of the algorithm and experiments. Moreover, relevant baselines might be missing.
The paper introduces SAIF, a novel adversarial attack framework that crafts highly imperceptible and sparse perturbations to expose vulnerabilities in neural network classifiers. Utilizing the Frank-Wolfe algorithm, SAIF optimizes for bounded magnitude and sparsity, achieving a convergence rate of . Empirical results demonstrate its superiority, significantly outperforming state-of-the-art sparse attack methods on ImageNet and CIFAR-10 datasets. This work not only highlights the susceptibility of classifiers to subtle perturbations but also contributes to the broader understanding of neural network robustness, providing a valuable tool for evaluating and enhancing adversarial resilience.
优点
The authors use an elegant Frank-Wolfe algorithm for the simultaneous optimization of adversarial perturbations. An convex surrogate is used for sparsity. SAIF demonstrates a sound technical approach, achieving a rapid convergence rate and ensuring the generation of adversarial examples with bounded magnitude and sparsity. The SAIF method outperforms state-of-the-art sparse attack methods on major datasets like ImageNet and CIFAR-10, especially when fewer pixels are allowed to be perturbed. SAIF also provides interpretable adversarial examples.
缺点
- The convergence analysis is very interesting. But I was wondering how this number reflects the real running time in practice. For example, what are the convergence rates for existing methods in Table 4?
- The models tested are un-defended. The authors may need to test some robust models. Even the 'regular' robust models adversarially trained with small values and without sparsity constraints are helpful. Another way is to train the model with SAIF on the fly, to see if it performs better under SAIF.
问题
- Given the perturbations' interpretability, I think it would be good if the authors could provide some transferability analysis across different model structures on SAIF, and compare it with existing works.
The paper considers the generation of a per-input white-box adversarial attack on vision classifiers constrained by and bounds simultaneously. To efficiently solve the resulting optimization problem, the authors leverage the classical Frank-Wolfe (FW) algorithm. The experimental evaluation is performed on the ImageNet and CIFAR10 datasets using the attack success rate and attack saliency metrics. The results show the promise of the approach.
优点
-
The use of the FW algorithm for crafting stealthy adversarial examples is novel and intuitive.
-
Within the proposed threat model, the evaluation results are strong.
缺点
-
I did not find a practical motivation behind the proposed threat model. Sparse and low-magnitude attacks can indeed be hard to detect. However, to create the SAIF attacks, the attacker needs unrealistic powers: (i) it has white-box access to the model parameters, (ii) it knows the exact inputs processed by the model in advance, and (iii) it can also make the target model perceive the examples perfectly. The runtime of the SAIF algorithm is also slow so that makes real-time attack generation difficult. If the goal is to study the theoretical robustness of the model as with other unrealistic attacks, then stealthiness and low magnitude together are not really necessary and constraining the adversary by or already gives a stronger measure of robustness than the threat model considered here.
-
Vision transformers have been shown to be more robust in literature (https://arxiv.org/abs/2105.07581) than the Inception and ResNet models considered here. It is not clear if the attack is effective on these more robust models.
-
I found the technical details related to FW hard to digest as the authors assume familiarity with the details of FW. For example, computing in section 3 involves maximizing over the set , but this is never defined. Similarly, the text in Section 4 suddenly starts talking about the undefined vectors and conditional gradients.
问题
-
The authors should either show practical attacks with SAIF or motivate why a theoretical study of robustness within the SAIF model is necessary. Stealthy attacks may have applications for captcha generation (https://arxiv.org/abs/2101.02483) but that scenario will require evaluation against extra baselines.
-
Can the FW method be adapted for more diverse constraints? e.g., rotation+ + snow?
-
I like the study about the interpretability of the perturbations but the authors did not motivate any end-to-end benefits of that to a practitioner.