应用科学学报 ›› 2025, Vol. 43 ›› Issue (5): 799-807.doi: 10.3969/j.issn.0255-8297.2025.05.007

• 信号与信息处理 • 上一篇    

通过可迁移性差距提升对抗可迁移性

王金伟1,2, 王海桦1, 吴昊1, 罗向阳3, 马宾4   

  1. 1. 南京信息工程大学 计算机学院, 江苏 南京 210044;
    2. 南京信息工程大学 数字取证教育部工程研究中心, 江苏 南京 210044;
    3. 数学工程与先进计算国家重点实验室, 河南 郑州 450001;
    4. 齐鲁工业大学 山东省计算机网络重点实验室, 山东 济南 250353
  • 收稿日期:2023-08-31 发布日期:2025-10-16
  • 通信作者: 王金伟,教授,研究方向为信息安全、多媒体取证、人工智能安全。E-mail:wjwei_2004@163.com E-mail:wjwei_2004@163.com
  • 基金资助:
    国家自然科学基金(No. 62072250, No. 62172435, No. U1804263, No. U20B2065, No. 61872203,No. 71802110, No. 61802212);中国中原科技创新领军人才项目基金(No. 214200510019);江苏省自然科学基金(No. BK20200750);河南省网络空间态势感知重点实验室开放课题基金(No. HNTS2022002);江苏省研究生科研与实践创新计划基金(No. KYCX200974);广东省信息安全技术重点实验室开放项目基金(No. 2020B1212060078);山东省计算机网络重点实验室开放项目基金(No. SDKLCN-2022-05);教育部人文社会科学项目基金(No. 19YJA630061);江苏省高校优势学科建设基金

Improvement of Adversarial Transferability via Transferability Gap

WANG Jingwei1,2, WANG Haihua1, WU Hao1, LUO Xiangyang3, MA Bin4   

  1. 1. School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, Jiangsu, China;
    2. Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, Jiangsu, China;
    3. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, Henan, China;
    4. Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology, Jinan 250353, Shandong, China
  • Received:2023-08-31 Published:2025-10-16

摘要: 现有的迁移攻击仅聚焦于经验风险的最大化,未考虑到迁移攻击的期望风险,从而导致迁移性不足,为此本文提出了一种基于可迁移性差距的迁移攻击。将迁移攻击的目标定义为一种期望风险的形式,并进一步定义了可迁移性差距,用来衡量迁移攻击的经验风险和期望风险之间的绝对误差。可以发现,当可迁移性差距较小时,最大化经验风险近似等价于最大化期望风险,从而获得可迁移的对抗样本。所提方案在最大化经验风险的同时,引入对抗机制,在最小化和最大化可迁移性差距之间寻求平衡。这种对抗思想使得该方案能够在最难迁移的情况下寻找到迁移能力最强的攻击算法,因此保证了对抗样本的高度可迁移性。实验结果表明,所提方案的性能优于最新的一些迁移攻击,可实现高可迁移性的对抗样本快速生成。

关键词: 对抗攻击, 可迁移性, 期望风险, 可迁移性差距

Abstract: Existing transfer-based attacks primarily focus on maximizing the empirical risk while ignoring the expected risk, which often leads to suboptimal transferability. To address this issue, we propose a transferability-gap-aware attack framework. First, we formulate the objective of transfer-based attacks as an expected risk and introduce the notion of the transferability gap, which quantifies the absolute discrepancy between the empirical risk and the expected risk. Our analysis reveals that when the transferability gap is small, maximizing the empirical risk becomes approximately equivalent to maximizing the expected risk, thereby leading to highly transferable adversarial examples. Based on this insight, the proposed method min-max the transferability gap while maximizing the empirical risk. Such min-max problem allows the attack algorithm with the strongest transferability to be found in the case of the hardest transferability. Experimental results show that the proposed method outperforms the recent state-of-the-art transfer-based attacks and achieves fast generation of highly transferable adversarial examples.

Key words: adversarial attack, transferability, expected risk, transferability gap

中图分类号: