Transferable Adversarial Examples with Bayesian Approach

Mingyuan Fan, Cen Chen, Wenmeng Zhou, Yinggui Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The vulnerability of deep neural networks (DNNs) to black-box adversarial attacks is one of the most heated topics in trustworthy AI. In such attacks, the attackers operate without any insider knowledge of the model, making the cross-model transferability of adversarial examples critical. Despite the potential for adversarial examples to be effective across various models, it has been observed that adversarial examples that are specifically crafted for a specific model often exhibit poor transferability. In this paper, we explore the transferability of adversarial examples via the lens of Bayesian approach. Specifically, we leverage Bayesian approach to probe the transferability and then study what constitutes a transferability-promoting prior. Following this, we design two concrete transferability-promoting priors, along with an adaptive dynamic weighting strategy for instances sampled from these priors. Employing these techniques, we present BayAtk. Extensive experiments illustrate the significant effectiveness of BayAtk in crafting more transferable adversarial examples against both undefended and defended black-box models compared to existing state-of-the-art attacks.

Original languageEnglish
Title of host publicationACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages517-529
Number of pages13
ISBN (Electronic)9798400714108
DOIs
StatePublished - 24 Aug 2025
Event20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025 - Hanoi, Viet Nam
Duration: 25 Aug 202529 Aug 2025

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025
Country/TerritoryViet Nam
CityHanoi
Period25/08/2529/08/25

Keywords

  • Adversarial examples
  • Deep neural networks
  • Transferability

Fingerprint

Dive into the research topics of 'Transferable Adversarial Examples with Bayesian Approach'. Together they form a unique fingerprint.

Cite this