Real-Time Adversarial Attacks

Real-Time Adversarial Attacks

Yuan Gong, Boyang Li, Christian Poellabauer, Yiyu Shi

Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence
Main track. Pages 4672-4680. https://doi.org/10.24963/ijcai.2019/649

In recent years, many efforts have demonstrated that modern machine learning algorithms are vulnerable to adversarial attacks, where small, but carefully crafted, perturbations on the input can make them fail. While these attack methods are very effective, they only focus on scenarios where the target model takes static input, i.e., an attacker can observe the entire original sample and then add a perturbation at any point of the sample. These attack approaches are not applicable to situations where the target model takes streaming input, i.e., an attacker is only able to observe past data points and add perturbations to the remaining (unobserved) data points of the input. In this paper, we propose a real-time adversarial attack scheme for machine learning models with streaming inputs.
Keywords:
Multidisciplinary Topics and Applications: Security and Privacy
Machine Learning Applications: Applications of Reinforcement Learning
Machine Learning: Time-series;Data Streams
Multidisciplinary Topics and Applications: Real-Time Systems