Mind the gap: detecting black-box adversarial attacks in the making through query update analysis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Adversarial attacks remain a significant threat that can jeopardize the integrity of Machine Learning (ML) models. In particular, query-based black-box attacks can generate malicious noise without having access to the victim model's architecture, making them practical in real-world contexts. The community has proposed several defenses against adversarial attacks, only to be broken by more advanced and adaptive attack strategies. In this paper, we propose a framework that detects if an adversarial noise instance is being generated. Unlike existing stateful defenses that detect adversarial noise generation by monitoring the input space, our approach learns adversarial patterns in the input update similarity space. In fact, we propose to observe a new metric called Delta Similarity (DS), which we show it captures more efficiently the adversarial behavior. We evaluate our approach against 8 state-of-the-art attacks, including adaptive attacks, where the adversary is aware of the defense and tries to evade detection. We find that our approach is significantly more robust than existing defenses both in terms of specificity and sensitivity.
Original languageEnglish
Title of host publicationProceedings of the 2025 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Publication statusAccepted - 13 Mar 2025
EventIEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR) - Nashville
Duration: 11 Jun 202515 Jun 2025

Publication series

NameProceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
ISSN (Print)1063-6919

Conference

ConferenceIEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR)
CityNashville
Period11/06/202515/06/2025

Fingerprint

Dive into the research topics of 'Mind the gap: detecting black-box adversarial attacks in the making through query update analysis'. Together they form a unique fingerprint.

Cite this