AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
Abstract
Imperceptible adversarial attacks aim to fool DNNs by adding imperceptible perturbation to the input data. Previous methods typically improve the imperceptibility of attacks by integrating common attack paradigms with specifically designed perception-based losses or the capabilities of generative models. In this paper, we propose Adversarial Attacks in Diffusion (AdvAD), a novel modeling framework distinct from existing attack paradigms. AdvAD innovatively conceptualizes attacking as a non-parametric diffusion process by theoretically exploring basic modeling approach rather than using the denoising or generation abilities of regular diffusion models requiring neural networks. At each step, much subtler yet effective adversarial guidance is crafted using only the attacked model without any additional network, which gradually leads the end of diffusion process from the original image to a desired imperceptible adversarial example. Grounded in a solid theoretical foundation of the proposed non-parametric diffusion process, AdvAD achieves high attack efficacy and imperceptibility with intrinsically lower overall perturbation strength. Additionally, an enhanced version AdvAD-X is proposed to evaluate the extreme of our novel framework under an ideal scenario. Extensive experiments demonstrate the effectiveness of the proposed AdvAD and AdvAD-X. Compared with state-of-the-art imperceptible attacks, AdvAD achieves an average of 99.9 (+17.3) ASR with 1.34 (-0.97) distance, 49.74 (+4.76) PSNR and 0.9971 (+0.0043) SSIM against four prevalent DNNs with three different architectures on the ImageNet-compatible dataset. Code is available at https://github.com/XianguiKang/AdvAD.
1 Introduction
Deep Neural Networks (DNNs) are shown to be vulnerable to adversarial attacks [1, 2] (i.e., add maliciously crafted perturbations to the input data), posing serious security concerns to real-world applications [3]. The research of adversarial attacks also plays an important role in proactively exposing potential threats, as well as promoting model robustness and corresponding defense methods [4, 5, 6, 7, 8, 9, 10, 11]. Many attacks [12, 13, 14, 15] focus on maximizing the attack success rate and transferability under relatively lenient restrictions (i.e., or norm) of adversarial perturbation, but they could have poor stealthiness and imperceptibility since the crafted adversarial examples can be easily detected by the Human Visual System (HVS) [16]. Therefore, imperceptible adversarial attacks [17, 18, 19, 20, 21, 22, 23], aiming to maintain attacking efficacy while improving imperceptibility, have attracted considerable attention.
Current imperceptible adversarial attacks could be summarized into two categories: 1) perturbation-based attacks devised on perceptual characteristics, and 2) unrestricted attacks. The first one is motivated by the fact that adding adversarial perturbations to different components of an image has varying perceptual quality levels to the HVS. By studying components such as image color [19], texture complexity [21], frequency spectrum [23, 24], etc., these methods design corresponding perceptual-based loss functions and incorporate them to the optimization process to craft adversarial examples where the adversarial perturbation is constrained and hidden within specific image regions. Instead of injecting noise-like adversarial perturbations, unrestricted attacks heavily but reasonably modify attributes of images like semantic content to perform attacks. Apart from early work that adopts GANs [25], some recent methods combine the prevalent diffusion models [26, 27, 28] into the adversarial optimization process in an image edition-like way of repeatedly adding noise and denoising to eliminate the noise pattern within the final adversarial examples [29, 30] or optimize the embedding of latent diffusion models [31, 32]. However, due to the uncertainty of generative models and the unrestricted setting itself, some unrestricted adversarial examples inevitably exhibit obvious unnatural texture or semantic changes and lose the imperceptibility, especially for images with complex content. Although previous methods have equipped attacks with imperceptibility utilizing various designs mentioned above, it remains an essential challenge of achieving imperceptible adversarial attacks: How to attack with inherently minimal perturbation strength from a modeling perspective?
To address this fundamental challenge, we propose Adversarial Attacks in Diffusion (AdvAD), a brand new modeling framework distinct from common attack paradigms of gradient ascending [2] or optimization with adversarial losses [17]. The proposed AdvAD explores a novel non-parametric diffusion process for attacks, which fully inherits two key merits of diffusion models: i) the modeling philosophy of converting a difficult task into a series of simple sub-tasks, and ii) solid theoretical foundation. Specifically, AdvAD achieves high attack efficacy with intrinsically lower perturbation strength by innovatively modeling the attack process as a decomposed diffusion trajectory from an initialized noise to an adversarial example. At each step, a much subtler (for imperceptibility) yet more effective (for attack performance) adversarial guidance is calculated and injected with two cooperating, theoretically grounded non-parametric modules called Attacked Model Guidance (AMG) and Pixel-level Constraint (PC), which gradually leads the end of this trajectory from the original image distribution to a desired adversarially conditioned distribution based on the theory of diffusion models (e.g., deterministic diffusion[27], conditional sampling [33, 34], etc.).
Here, we would like to clarify that the proposed diffusion process for attacks is considered as non-parametric since it does not require additional networks as needed in regular diffusion models for noise estimation. AdvAD firstly initializes a fixed diffusion noise, which is then ingeniously manipulated at each step via the adversarial guidance crafted by the proposed AMG and PC modules using only the attacked model with theoretically derived equations. In this way, the proposed AdvAD is facilitated with the modeling approach of diffusion models rather than their denoising or generative capabilities, which avoids the negative impact like semantic content changes caused by the uncertainty of generative models and also promises relatively low computational complexity. Based on AdvAD, we further propose an enhanced version AdvAD-X (‘X’ for ‘eXtreme’) with two extra strategies to squeeze the extreme performance in an ideal scenario of the proposed new modeling framework with unique properties, which also possesses theoretical significance and provides new insights for revealing the robustness of DNNs. In summary, our main contributions are:
-
•
Addressing the essential challenge of imperceptible adversarial attacks from a novel modeling perspective for the first time, we theoretically explore and derive the basic modeling of diffusion models to perform attacks with inherently lower perturbation strength through a non-parametric diffusion process that requires no additional networks.
-
•
We propose two attack versions, AdvAD and AdvAD-X. For the basic AdvAD, the AMG and PC modules cooperate to craft much subtler yet effective adversarial guidance which is progressively injected via initialized diffusion noise at each step, and AdvAD-X further reduces the perturbation strength to an extreme level in an ideal scenario with theoretical significance.
-
•
Extensive experiments are conducted to evaluate the effectiveness of our methods in terms of attack success rate, imperceptibility, and robustness. Experimental results demonstrate the superiority of the novel modeling approach for imperceptible adversarial attacks.
2 Preliminaries
Adversarial Attacks. Given an original image with ground-truth label and a classifier satisfying , normal untargeted attacks aim to craft the adversarial example that misleads the classifier, formulated as:
(1) |
where represents -norm that is usually implemented with -norm to limit the distance between and within an upper bound of budget . In this paper, we focus on the more general setting of untargeted attacks. More information on related works is provided in Appendix A.
Deterministic Diffusion Process. In the deterministic situation of DDIM [27] with , for an image and pre-defined diffusion coefficients for step , in the Forward process of adding noise to is given by , where represents Gaussian noise. For the Backward denoising steps, unlike the DDPM [26] based on Markov chains that each state directly depends on the previous one, DDIM employs a non-Markovian approach. In the backward process, each step first involves calculating a "prediction" of final step from current , then adding noise to it again to obtain , expressed as:
(2) |
where is a estimated diffusion noise using a pretrained neural network for current step, and the term in the first parenthesis represents the predicted , derived by a simple variation of Eq. (2).
Conditional sampling. Song et al. [34] propose the conditional sampling technique for the score-based generative models with score function [35], a kind of generative model has close relationship to diffusion models. Without loss of generality, for a condition (e.g., class label, mask, etc.) and corresponding conditional distribution , a score-based model can sample from by modifying the score function at each step of to if is known. Subsequently, with the connection between the score function and the noise of diffusion models as [34], this joint distribution could be expanded to the deterministic process of DDIM, achieved by updating the noise to at each step as [33]:
(3) |
3 Proposed Adversarial Attacks in Diffusion
3.1 Overview
From a novel modeling perspective, we propose Adversarial Attacks in Diffusion (AdvAD) to attack with inherently smaller perturbation strength through a non-parametric diffusion process for the first time. As shown in Figure 1, different from previous attack paradigms that employ gradient ascending or optimization with varying kinds of adversarial losses, AdvAD innovatively performs attack within a decomposed non-parametric diffusion trajectory starting from an initialized noise, in which very subtle yet effective adversarial guidance is crafted and injected to gradually push the end of this trajectory to a desired adversarially conditioned distribution from the original image.
Intuitively, given the original image with an initialized Gaussian noise , a fixed diffusion trajectory from to () can be easily obtained using DDIM Backward for the deterministic diffusion process as:
(4) |
(5) |
With this deterministic diffusion trajectory of the original image, performing adversarial attacks within it requires solving two main problems: i) directing the final result of this diffusion process to a desired adversarial example rather than the original image; ii) ensuring the modified trajectory (denoted as , for step ) close to the original trajectory (, for step ) of the clean image to achieve the imperceptibility of attacks. To fulfill the dual purposes, we propose two theoretically grounded modules, called Attacked Model Guidance (AMG) and Pixel-level Constraint (PC) to work together. At each step, AMG utilizes only the attacked model to produce the adversarial guidance without requiring any additional networks, synergistically collaborated with PC to constrain and streamline the diffusion process injected with the guidances.

3.2 Attacked Model Guidance Module
By viewing the attack process as a distribution-to-distribution transformation through a non-parametric diffusion process, the proposed AMG module theoretically integrates the conditional sampling technique of diffusion models to craft the adversarial guidance only using the attacked model . For untargeted attacks, the ultimate goal is modifying with to so that , which can be regarded as directing the determined distribution of the original diffusion trajectory to an distribution of with the attacked model as . Thus, we regard as an adversarial condition, and employ the conditional sampling technique to the original trajectory by manipulating the diffusion noise to achieve this, expressed as:
(6) | ||||
However, Eq. (6) is unsolvable since is unknown during the diffusing process. To address this, inspired by the properties of deterministic non-Markovian DDIM that a final diffusion result is firstly predicted at each step, we calculate via the equation of DDIM non-Markovian process with from the previous step, and use it to approximate , expressed as:
(7) |
The accurate error upper bound and convergence of this approximation are given in Proposition 2 in conjunction with the proposed PC module, and the validity of this approximation can also be explained intuitively from the premise of our method. That is, we have for all step in the original diffusion trajectory, and the modified trajectory should be very close to the original one, so that the relationship between and should satisfy .
With Eq. (7), the term of in Eq. (6) can be written as since is calculated from , which is exactly the output logits of with function for the class . Denoting this term as the classification probability of the attacked model as , we can obtain the solvable equation of AMG module that injects adversarial guidance to the initialized diffusion noise using only without any additional network:
(8) |
At this point, in addition to the benefits from modeling, this calculation process of AMG also plays a role in endowing AdvAD with imperceptibility. As the attack progresses, the probability , the term of as well as coefficient gradually approach 0, which means the strength of injected adversarial guidance gradually converge to 0 in AdvAD, while common classification losses (e.g, Cross-Entropy, Log Loss, etc.) used in other attack paradigms may increase on the contrary. Further analysis and experiments on this property are provided in Proposition 1 and Sec. 4.5.
Input: Attacked model , image with label , budget , step ;
Output: Adversarial example
3.3 Pixel-level Constraint Module
Collaborating with AMG, the PC module is introduced to impose precise control and streamline the modified diffusion trajectory for attacks. A straightforward choice is to design PC for that constrains each using , thus ensuring close to and the final close to . However, such a "hard" constraint directly applied to will impair the effectiveness of AMG and disrupt coherence of the transforming trajectory. Therefore, we formulate a more suitable PC for as in Theorem 1.
Theorem 1
Given diffusion coefficients , the , , from the original trajectory, , from the modified trajectory, and a variable , if and satisfies
(9) |
for all , then it follows that hold true.
According to Theorem 1, the PC for is implemented as:
(10) |
where is a projection operation that constrains the output of AMG to based on a -norm ball of to satisfy Eq. (9). After PC, the diffusion noise for next step is obtained, and the can be calculated using the deterministic DDIM backward equation as:
(11) |
The elaborate PC for directly cooperates with AMG to constrain the diffusion noise, which streamlines the whole diffusion process and can serve to simultaneously control the terms of , , and , satisfying the premise that two trajectories are close and ensuring the effectiveness of AdvAD. The complete pseudo code of AdvAD is provided in Algorithm 1.
Subsquently, based on Theorem 1, we further give two propositions about AdvAD as:
Proposition 1
Under the conditions of Theorem 1, by denoting constrained , we have
(12) |
where , and .
Proposition 2
Under the conditions of Theorem 1, the upper bound on the error of the approximation in Eq. (7) can be expressed as
(13) |
Proposition 1 explicitly states the much subtler and decreasing strength of the adversarial guidance injected at each step of AdvAD’s non-parametric diffusion process, and also allows for a quantitative analysis (as in Sec. 5.5). Proposition 2 indicates the validity and convergence of the approximation of in AMG (Eq. (7)). It is evident that as goes from to , increases from to , the upper bound on the approximation error rapidly converge from to . The detailed derivations of the mentioned PC for , proofs of Theorem 1 and Proposition 1, 2 are provided in Appendix B.
3.4 AdvAD to AdvAD-X: Extreme Version
Building upon AdvAD, we further propose a scheme called AdvAD-X (‘X’ for ‘eXtreme’) with two extra strategies called Dynamic Guidance Injection (DGI) and CAM Assistance (CA), aiming to squeeze the extreme performance of our novel modeling framework in an ideal scenario that is usually overlooked but has theoretical significance.
DGI and CA Strageties.
As aforementioned, the attack capability of AdvAD comes from the very subtle yet effective adversarial guidance crafted by AMG and PC, and the intensity of guidance will decrease to 0 as the process progresses. Thus, the DGI is naturally emerged as a dynamic skipping stragety to skip the unnecessary calculation and injection of adversarial guidance, especially for those steps in the later process. With DGI, AdvAD-X dynamically avoids the execution of AMG and PC and adopts original as the diffusion noise for the steps where the is already able to mislead the attacked model, reducing the accumulated guidance strength as well as the computational complexity. On the other hand, inspired by the Class Activation Mapping (CAM) [36] identifies critical regions of an image about a decision made of a classifier, our CA strategy calculates a mask (if available) ranging from to of with and using GradCAM [37] to further suppress the strength of adversarial guidance within the non-critical image regions in those steps that are not skipped. The equation of AMG with CA strategy can be modified as:
(14) |
Ideal Scenario.
Equipped with DGI, AdvAD-X omits a large number of adversarial guidance that is injected by default in AdvAD, while the absolute strength of guidance in each of the remaining steps are also suppressed by CA, successfully reducing the final adversarial perturbation to an extreme level. This extreme case leads to a problem that in the default setting of attacking with 8-Bit RGB images, the adversarial perturbation of pixels where the intensity is less than will be erased due to the quantization. However, in practice, the input of DNNs is normalized as floating-point data type to avoid gradient problems during training [38, 39], and white-box attack allows access to the entire of DNNs. Therefore, for AdvAD-X, we specifically consider an ideal scenario that directly input the raw final adversarial example in floating-point data to DNNs without quantization to evaluate the extreme performance of AdvAD-X. The pseudo code of AdvAD-X is provided in Appendix C.
4 Experiments
4.1 Experimental Setup
Dataset. In line with prior studies [19, 40, 15, 32], our experiments are conducted on the ImageNet-compatible Dataset 111https://github.com/cleverhans-lab/cleverhans/tree/master/cleverhans_v3.1.0/examples/nips17_adversarial_competition/dataset, containing 1,000 images of ImageNet [41] classes with size of , and the images are resized to standard input size of in all experiments. Models. We select the widely used CNNs of ResNet-50 [42] and enhanced ConvNeXt-Base [43], Swin Transformer-Base [44] with Transformer [45] architecture, and VisionMamba-Small [46] with the recently emerged advanced Mamba [47] architecture. Attacks. We choose classic PGD [12] and seven attacks that claim having imperceptibility as comparison methods, including normal imperceptible attacks of AdvDrop [21], PerC-AL [19], SSAH [24], and unrestricted attacks of NCF [40], ACA [32], DiffAttack [31], Diff-PGD [30], and the generative capability of diffusion models are utilized the last three attacks. For our proposed AdvAD and AdvAD-X, we set and for all experiments unless specifically mentioned. All the other comparison methods are evaluated using their official open-source code with the default hyper-parameters. The results of AdvAD-X are obtained in the ideal scenario with float-pointing raw data as described in Sec. 3.4. Evaluation Metrics. Attack success rate (ASR) is used to evaluate the attack efficacy, and seven metrics are adopted to comprehensively assess the imperceptibility, including and distances for absolute perturbation strength; Peak Signal-to-Noise Ratio (PSNR), Structure Similarity (SSIM) [48], and three network-based metrics, i.e., Learned Perceptual Image Patch Similarity (LPIPS) [49], Fréchet Inception Distance (FID) [50], and a non-reference metric MUSIQ [51] for image quality.
Model | Attack Method | Time (s) | ASR () | PSNR | SSIM | FID | LPIPS | MUSIQ | ||
ResNet-50 [42] | PGD [12] | 25 | 98.6 | 0.031 | 8.17 | 33.53 | 0.8830 | 35.25 | 0.0517 | 52.24 |
NCF [40] | 2739 | 89.9 | 0.783 | 75.16 | 14.79 | 0.6374 | 58.99 | 0.3052 | 49.12 | |
ACA [32] | 82239 | 89.8 | 0.839 | 52.42 | 18.00 | 0.5659 | 69.57 | 0.3381 | 55.47 | |
DiffAttack [31] | 34954 | 96.6 | 0.743 | 30.51 | 22.63 | 0.6750 | 55.29 | 0.1130 | 55.67 | |
DiffPGD [30] | 6057 | 92.1 | 0.246 | 11.43 | 30.95 | 0.8902 | 22.18 | 0.0315 | 55.05 | |
AdvDrop [21] | 193 | 96.8 | 0.062 | 3.17 | 41.91 | 0.9872 | 5.57 | 0.0061 | 54.96 | |
PerC-AL [19] | 4085 | 98.8 | 0.131 | 2.05 | 46.35 | 0.9894 | 8.62 | 0.0029 | 55.84 | |
SSAH [24] | 428 | 99.7 | 0.033 | 2.65 | 43.73 | 0.9911 | 4.48 | 0.0021 | 55.49 | |
AdvAD (ours) | 2201 | 99.7 | 0.010 | 1.06 | 51.84 | 0.9980 | 2.42 | 0.0005 | 56.35 | |
806 | 100.0 | 0.002 | 0.34 | 63.62 | 0.9997 | 0.23 | 0.0001 | 56.59 | ||
ConvNeXt -Base [43] | PGD [12] | 127 | 99.9 | 0.031 | 7.98 | 33.74 | 0.8845 | 32.03 | 0.0386 | 51.85 |
NCF [40] | 5222 | 59.4 | 0.750 | 72.89 | 15.10 | 0.6616 | 50.52 | 0.2846 | 49.70 | |
ACA [32] | 83149 | 82.2 | 0.835 | 52.16 | 18.05 | 0.5676 | 68.45 | 0.3421 | 55.11 | |
DiffAttack [31] | 35417 | 97.8 | 0.754 | 31.70 | 22.28 | 0.6610 | 72.22 | 0.1277 | 54.80 | |
DiffPGD [30] | 6325 | 76.9 | 0.245 | 11.45 | 30.94 | 0.8908 | 21.05 | 0.0306 | 54.75 | |
AdvDrop [21] | 838 | 96.9 | 0.057 | 3.26 | 41.69 | 0.9864 | 6.42 | 0.0055 | 54.80 | |
PerC-AL [19] | 18271 | 10.3 | - | - | - | - | - | - | - | |
SSAH [24] | 3423 | 84.6 | 0.026 | 2.24 | 45.19 | 0.9928 | 3.04 | 0.0011 | 55.78 | |
AdvAD (ours) | 15240 | 100.0 | 0.016 | 1.49 | 48.61 | 0.9964 | 5.07 | 0.0009 | 55.97 | |
5245 | 99.8 | 0.004 | 0.64 | 58.01 | 0.9993 | 0.62 | 0.0001 | 56.43 | ||
Swin Trans. -Base [44] | PGD [12] | 93 | 98.5 | 0.031 | 7.85 | 33.88 | 0.8861 | 21.34 | 0.0378 | 51.91 |
NCF [40] | 4690 | 63.7 | 0.733 | 69.92 | 15.48 | 0.6822 | 47.17 | 0.2709 | 49.77 | |
ACA [32] | 83706 | 79.6 | 0.831 | 50.70 | 18.31 | 0.5757 | 64.83 | 0.3341 | 55.65 | |
DiffAttack [31] | 36736 | 89.7 | 0.741 | 30.45 | 22.67 | 0.6727 | 53.32 | 0.1143 | 55.72 | |
DiffPGD [30] | 6499 | 69.1 | 0.244 | 11.26 | 31.10 | 0.8945 | 16.19 | 0.0276 | 55.25 | |
AdvDrop [21] | 673 | 97.2 | 0.063 | 3.37 | 41.43 | 0.9853 | 5.22 | 0.0065 | 54.73 | |
PerC-AL [19] | 15258 | 95.6 | 0.144 | 2.15 | 45.93 | 0.9882 | 3.53 | 0.0015 | 55.66 | |
SSAH [24] | 1737 | 96.3 | 0.035 | 2.41 | 44.60 | 0.9927 | 2.57 | 0.0010 | 55.53 | |
AdvAD (ours) | 9729 | 100.0 | 0.013 | 1.19 | 50.57 | 0.9978 | 1.70 | 0.0004 | 56.17 | |
5243 | 99.7 | 0.005 | 0.52 | 60.29 | 0.9995 | 0.25 | 0.0001 | 56.47 | ||
VisionMamba -Small [46] | PGD [12] | 63 | 95.7 | 0.031 | 7.99 | 33.73 | 0.8884 | 26.09 | 0.0503 | 52.37 |
NCF [40] | 3919 | 71.7 | 0.738 | 68.71 | 15.68 | 0.6876 | 46.07 | 0.2629 | 50.05 | |
ACA [32] | 96851 | 84.2 | 0.831 | 50.88 | 18.28 | 0.5753 | 65.77 | 0.3329 | 55.28 | |
DiffAttack [31] | 43043 | 90.9 | 0.749 | 30.94 | 22.52 | 0.6693 | 52.16 | 0.1179 | 55.66 | |
DiffPGD [30] | 7638 | 83.4 | 0.248 | 11.75 | 30.68 | 0.8845 | 21.02 | 0.0378 | 54.19 | |
AdvDrop [21] | 1311 | 97.0 | 0.076 | 4.42 | 39.30 | 0.9761 | 8.02 | 0.0086 | 54.34 | |
PerC-AL [19] | 10400 | 6.5 | - | - | - | - | - | - | - | |
SSAH [24] | 1204 | 49.8 | 0.028 | 1.95 | 46.41 | 0.9946 | 2.08 | 0.0018 | 55.96 | |
AdvAD (ours) | 6154 | 99.7 | 0.016 | 1.62 | 47.94 | 0.9960 | 3.67 | 0.0017 | 56.17 | |
4021 | 99.4 | 0.005 | 0.69 | 58.90 | 0.9989 | 0.51 | 0.0004 | 56.50 |

4.2 Comparison with State-of-the-art Methods
White-Box Attacks.
Table 1 reports the untargeted attack performance and imperceptibility of ten methods against four attacked models. It is evident that the proposed AdvAD with novel modeling framework consistently demonstrates superior performance in terms of both ASR and imperceptibility. For the normal imperceptible adversarial attacks, the absolute adversarial perturbation strength of AdvAD in and distance are only 0.014 and 1.34 in average, which is about half of the state-of-the-art restricted imperceptible attack SSAH, and AdvAD maintains almost 99.9% ASR, supporting our key idea that it inherently reduces the strength of perturbation required for attacks from a modeling perspective. When attacking more advanced models from ResNet to VisionMamba, AdvAD always demonstrates the best ASR and imperceptibility, yet other methods tend to have some performance degradation (e.g., PerC-AL and SSAH for ConvNeXt and VisionMamba). For unrestricted attacks, it is expected for them to perform poorly in the quantitative metrics, but if the results are poor for all image quality metrics, it usually indicates that the images are damaged. Meanwhile, since the optimizer may not find the global optimal solution, the optimization-based methods tent to show sub-optimal ASR. For AdvAD-X, surprisingly, the perturbation strength is reduced to an extremely low level with still high attack efficacy in the ideal scenario with floating-point raw data.
Visualization.
The visualizations of adversarial examples againt ResNet-50 in Figure 2 clearly show the characteristics of different imperceptible attacks against ResNet-50. For the first image with a relatively simple and clear object, the unrestricted attacks of NCF, DiffAttack and ACA perform attacks by modifying the semantics fairly, while DiffPGD uses denoising to avoid significant semantic modifications, but often has lower ASR as in Table 1. However, for the image with complex content, the unrestricted attacks result in obvious unnatural color, texture, artifacts and semantic changes. For the normal attacks with perceptual-based restrictions, by amplifying the noises, it can be seen that AdvDrop has a obvious gridding effect due to the blocking operation in DCT operation, and the perturbation strength in PerC-AL and SSAH is also related to the edge or texture components of the image. In contrast, our AdvAD continuously maintains uniform and lower perturbation which is very difficult to be seen even in the adversarial examples with noise. For AdvAD-X, the perturbations are very slight modifications to the decimal places of the floating-point raw data for each pixel, thus it is still difficult to be seen even after magnification. More quantitative comparisons and visualizations are provided in Appendix D.1, D.2.
Attack Method | Post Purifications (Normal Res-50) | Attack Adversarial Training Model | All Avg. | ||||||||
NRP [4] | DS [52] | Diffusion [5] | Avg. | Inc-V3 [8] | Res-50 [9] | Swin-B [53] | ConvNeXt-B [53] | Avg. | |||
AdvDrop [21] | 50.2 | 30.1 | 37.1 | 39.1 | 93.7 | 72.4 | 31.2 | 37.3 | 58.7 | 50.3 | |
PerC-AL [19] | 30.3 | 28.8 | 25.4 | 28.2 | 99.9 | 46.1 | 8.2 | 7.0 | 40.3 | 35.1 | |
SSAH [24] | 25.6 | 28.0 | 11.0 | 21.5 | 91.2 | 84.6 | 16.8 | 47.4 | 60.0 | 43.5 | |
AdvAD (ours) | 51.5 | 29.5 | 31.2 | 37.4 | 98.9 | 79.3 | 60.2 | 62.7 | 75.3 | 59.0 | |
13.4 | 27.6 | 10.2 | 17.1 | 57.2 | 45.2 | 18.0 | 16.2 | 34.2 | 26.8 |

ASR | ASR | ASR | ||||||
clean | 17.3 | - | 30.3 | - | 46.8 | - | ||
AdvDrop | 25.2 | 5.97 | 33.5 | 6.21 | 48.7 | 5.61 | ||
SSAH | 21.8 | 13.84 | 32.4 | 14.82 | 46.9 | 13.68 | ||
AdvAD (ours) | 28.2 | 2.41 | 36.8 | 2.51 | 50.4 | 2.08 |
4.3 Robustness
The robustness of attacks is also evaluated against defense methods, including purification methods of NRP [4], DS [52], diffusion-based purification [5] and adversarial training robust models of Inc-V3 [8], Res-50 [9], Swin-B [53], ConvNeXt-B [53]. Two classic image transformation defenses of JPEG compression [54], Bit-depth reduction [55], and another type of defense, random smoothing [11], are also included. Considering the robustness and transferability of attacks are comparable only under close perturbation budget, the unrestricted attacks are not included in this and the next section.
As shown in Table 2, the proposed AdvAD demonstrates the best robustness in overall average compared with other imperceptible attacks of AdvDrop, PerC-AL and SSAH. Specifically, when attacking robust models, AdvAD achieved an much higher average ASR of 75.3. For post-processing purifications aim at eliminating adversarial perturbations, despite the inherently lower perturbation strength, AdvAD still maintains the best or second-best ASR against different purifications, which is comparable to AdvDrop with much higher perturbation strength. Similarly, for the results of classic image transformation defenses in Figure 4, AdvAD also exhibits advantages in most of the factors. In addition, since random smoothing is not a truly end-to-end method but a method that uses the base model to make multiple predictions on noise-augmented images, we adpot a semi-white-box setup to fully test the attack performance as described in the caption. Table 4 shows the experimental results, and the PerC-AL is not included because it fails to attack in this setting. It can be seen that for all , our AdvAD continuously achieves the best ASR with smaller perturbation strength.

We suppose the robustness of AdvAD mainly benefits from two aspects. Firstly, AdvAD performs attacks during a unique non-parametric diffusion process with adversarial guidance, which may be easier to break through existing adversarial training models using common attack paradigms. On the other hand, the inherently lower perturbation crafted by AdvAD is spread across the images more uniformly rather than gathering in some areas as can be seen in the visualization, making it more difficult to be eliminated. For AdvAD-X, it is anticipated to exhibit weak robustness since the extremely low perturbation in the ideal scenario is easy to defense.
Model | Attack Method | Res-50 | Mob-V2 | Inc-V3 | VGG-19 | PSNR | SSIM | FID | LPIPS | |
Res-50 [42] | SSAH [24] | 15.5 | 20.4 | 12.7 | 2.65 | 43.73 | 0.9911 | 4.48 | 0.0021 | |
AdvAD (=1000) | 18.3 | 22.6 | 15.1 | 1.06 | 51.84 | 0.9980 | 2.42 | 0.0005 | ||
AdvDrop [21] | 17.3 | 23.1 | 15.8 | 3.17 | 41.91 | 0.9872 | 5.57 | 0.0061 | ||
PerC-AL [19] | 22.4 | 23.8 | 17.4 | 2.05 | 46.35 | 0.9894 | 8.62 | 0.0029 | ||
AdvAD (=100) | 23.5 | 24.9 | 19.9 | 1.97 | 46.04 | 0.9912 | 7.15 | 0.0026 | ||
PGD [12] | 41.4 | 36.7 | 36.0 | 8.17 | 33.53 | 0.8830 | 35.25 | 0.0517 | ||
AdvAD (=10) | 44.3 | 37.6 | 42.9 | 7.21 | 34.63 | 0.9015 | 30.84 | 0.0547 | ||
Mob-V2 [56] | SSAH [24] | 7.7 | 19.8 | 11.6 | 2.18 | 45.24 | 0.9930 | 2.95 | 0.0016 | |
AdvAD (=1000) | 9.7 | 21.3 | 14.8 | 0.94 | 53.08 | 0.9982 | 1.46 | 0.0004 | ||
AdvDrop [21] | 9.7 | 22.7 | 15.0 | 3.16 | 41.94 | 0.9873 | 4.88 | 0.0064 | ||
PerC-AL [19] | 12.7 | 23.3 | 17.8 | 2.16 | 45.67 | 0.9879 | 8.77 | 0.0032 | ||
AdvAD (=100) | 12.2 | 23.4 | 17.9 | 1.83 | 46.68 | 0.9919 | 4.73 | 0.0020 | ||
PGD [12] | 29.9 | 35.3 | 37.9 | 8.29 | 33.41 | 0.8803 | 34.57 | 0.0500 | ||
AdvAD (=10) | 30.6 | 35.3 | 38.5 | 7.23 | 34.60 | 0.9006 | 27.25 | 0.0480 |
4.4 Transferability and Effect of Step on AdvAD
Table 3 reports the ASRs of black-box attacks and the corresponding results of imperceptibility. We also test AdvAD with different step of for comprehensive evaluation. Consistent with the diffusion models, a larger denotes a finer decomposition granularity of the entire process, corresponding to the strength of adversarial guidance at each step. Thus, AdvAD with a larger exhibits better imperceptibility, while a smaller implies stronger black-box transferability. Notbly, though there is a clear negative correlation between imperceptibility and transferability, our AdvAD exceeds all comparison attacks in both of transferability and imperceptibility at different comparable levels, demonstrating the effectiveness of the proposed novel modeling framework.
To further elaborate the relationship between transferability and imperceptibility of AdvAD, as well as the optimal trade-off in practice, we plot two line graphs in Figure 5 under more values of . As shown in Figure 5 (a), as the value of on the horizontal axis changes, the relationship between imperceptibility and transferability shows a clear proportional trend as mentioned above, consistent across different surrogate models. For the optimal trade-off, we consider that the intersection point of the two curves represents a balance between imperceptibility and transferability. Accordingly, for the ResNet-50 and MobileNetV2 models, the optimal values of are 50 and 25, respectively. Moreover, Figure 5 (b) illustrates more direct curves of this relationship and the positions of other comparison methods within it. Note that, all the other comparison methods are located to the lower left of the curve of AdvAD. This indicates that our method consistently achieves the best results in both transferability and imperceptibility compared with other state-of-the-art restricted imperceptible attacks, demonstrating the effectiveness of our AdvAD as a new attack framework with flexibility through the proposed non-parametric diffusion process.

Attack | ASR | PSNR | SSIM | FID | ||
4/255 | AdvAD | 98.6 | 0.93 | 53.27 | 0.9986 | 1.78 |
100.0 | 0.29 | 65.07 | 0.9998 | 0.18 | ||
2/255 | AdvAD | 96.1 | 0.82 | 54.85 | 0.9989 | 1.33 |
99.4 | 0.27 | 65.95 | 0.9998 | 0.15 | ||
1/255 | AdvAD | 87.4 | 0.66 | 57.87 | 0.9993 | 0.77 |
94.8 | 0.26 | 66.42 | 0.9998 | 0.14 |
4.5 Analysis
Eq. (12) in Practice. With the derived analytical formulation of Proposition 1, in Figure 7, we illustrate the actual values of and of Eq. (12) using 100 randomly selected images. While Proposition 1 indicates that the upper bound of is invariant with respect to step , the actual strength of the adversarial guidance produced by AMG rapidly decreases as the process progresses, which validates the unique property given at the end of Sec. 3.2. With the similarly decreasing , the whole term of representing distance of the guidance at step also decreases from about 0.0008 to 0, supporting that the proposed modeling framework performs imperceptible attacks with inherently small perturbation strength. Performance with Smaller . The results of AdvAD and AdvAD-X with smaller for PC module are shown in Table 7. As decreases from to , the imperceptibility is naturally improved because of the upper bound of perturbation becomes lower, yet the ASR of 94.8% only drops slightly. When , AdvAD still holds 87.4% ASR with 57.87 PSNR and 0.9993 SSIM, which means a large number of examples still can fool the DNN with a maximum of modification for each pixel, demonstrating the effectiveness of the adversarial guidance injected in the proposed diffusion process for attacks. Moreover, we provide the ablation study of AdvAD-X and additional discussions in Appendix D.3, D.4.
5 Conclusion and Outlook
In this paper, we propose a novel, fundamental modeling framework distinct from existing paradigms to tackle the challenge of imperceptible attacks. By exploring and deriving basic theory of diffusion models, the proposed AdvAD performs attacks through a non-parametric diffusion process with adversarial guidance, achieving inherently lower overall perturbation strength with high attack efficacy from a modeling perspective. Besides, the proposed AdvAD-X evaluates the extreme of this novel modeling framework and further reduces the perturbation strength to an extremely low level in an ideal scenario. Extensive experimental results support the effectiveness and progressiveness of the proposed methods. Beyond imperceptibility, AdvAD holds the potential to become a general and extensible attack paradigm thanks to the solid theoretical foundation and the innovative, controllable diffusion-based process for attacks. In addition, we also hope the new observation that AdvAD-X can successfully attack with extremely small perturbation using floating-point raw data can bring inspiration for revealing the robustness and interpretability (e.g., decision boundaries) of DNNs.
Acknowledgments and Disclosure of Funding
This work was supported by NSFC (Grant No. 62072484), Natural Science Foundation of Guangdong Province (Grant No. 2514050000889) and Guangdong Key Laboratory of Information Security (No. 2023B1212060026).
References
- Szegedy et al. [2014] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. In International Conference on Learning Representations, 2014.
- Goodfellow et al. [2015] I. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. In International Conference on Learning Representations, 2015.
- Yuan et al. [2019] X. Yuan, P. He, Q. Zhu, and X. Li. Adversarial examples: Attacks and defenses for deep learning. IEEE Transactions on Neural Networks and Learning Systems, 30(9):2805–2824, 2019.
- Naseer et al. [2020] M. Naseer, S. Khan, M. Hayat, F. S. Khan, and F. Porikli. A self-supervised approach for adversarial robustness. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 262–271, 2020.
- Lee and Kim [2023] M. Lee and D. Kim. Robust evaluation of diffusion-based adversarial purification. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 134–144, 2023.
- Singh et al. [2024] N. D. Singh, F. Croce, and M. Hein. Revisiting adversarial training for imagenet: Architectures, training and generalization across threat models. Advances in Neural Information Processing Systems, 36, 2024.
- Luo et al. [2023] A. Luo, C. Kong, J. Huang, Y. Hu, X. Kang, and A. C Kot. Beyond the prior forgery knowledge: Mining critical clues for general face forgery detection. IEEE Transactions on Information Forensics and Security, 19:1168–1182, 2023.
- Tramèr et al. [2018] F. Tramèr, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, and P. McDaniel. Ensemble adversarial training: Attacks and defenses. In International Conference on Learning Representations, 2018.
- Salman et al. [2020a] H. Salman, A. Ilyas, L. Engstrom, A. Kapoor, and A. Madry. Do adversarially robust imagenet models transfer better? Advances in Neural Information Processing Systems, 33:3533–3545, 2020a.
- Luo et al. [2021] A. Luo, E. Li, Y. Liu, X. Kang, and Z J. Wang. A capsule network based approach for detection of audio spoofing attacks. In ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing, pages 6359–6363. IEEE, 2021.
- Cohen et al. [2019] J. Cohen, E. Rosenfeld, and Z. Kolter. Certified adversarial robustness via randomized smoothing. In International Conference on Machine Learning, pages 1310–1320. PMLR, 2019.
- Madry et al. [2018] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu. Towards deep learning models resistant to adversarial attacks. International Conference on Learning Representations, 2018.
- Dong et al. [2018] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li. Boosting adversarial attacks with momentum. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 9185–9193, 2018.
- Zhang et al. [2022] Y. Zhang, Y. Tan, T. Chen, X. Liu, Q. Zhang, and Y. Li. Enhancing the transferability of adversarial examples with random patch. In Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22, pages 1672–1678, 2022.
- Wei et al. [2023] Z. Wei, J. Chen, Z. Wu, and Y. Jiang. Enhancing the self-universality for transferable targeted attacks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 12281–12290, 2023.
- Sharif et al. [2018] M. Sharif, L. Bauer, and M. Reiter. On the suitability of lp-norms for creating and preventing adversarial examples. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 1605–1613, 2018.
- Carlini and Wagner [2017] N. Carlini and D. Wagner. Towards evaluating the robustness of neural networks. In IEEE Symposium on Security and Privacy, pages 39–57. IEEE, 2017.
- Luo et al. [2018] B. Luo, Y. Liu, L. Wei, and Q. Xu. Towards imperceptible and robust adversarial example attacks against neural networks. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 32, 2018.
- Zhao et al. [2020] Z. Zhao, Z. Liu, and M. Larson. Towards large yet imperceptible adversarial image perturbations with perceptual color distance. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 1039–1048, 2020.
- Laidlaw et al. [2021] C. Laidlaw, S. Singla, and S. Feizi. Perceptual adversarial robustness: Defense against unseen threat models. In International Conference on Learning Representations, 2021.
- Duan et al. [2021] R. Duan, Y. Chen, D. Niu, Y. Yang, A. Qin, and Y. He. Advdrop: Adversarial attack to dnns by dropping information. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 7506–7515, 2021.
- Chen et al. [2023a] Z. Chen, Z. Wang, J. Huang, W. Zhao, X. Liu, and D. Guan. Imperceptible adversarial attack via invertible neural networks. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 37, pages 414–424, 2023a.
- Jia et al. [2022] S. Jia, C. Ma, T. Yao, B. Yin, S. Ding, and X. Yang. Exploring frequency adversarial attacks for face forgery detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 4103–4112, 2022.
- Luo et al. [2022] C. Luo, Q. Lin, W. Xie, B. Wu, J. Xie, and L. Shen. Frequency-driven imperceptible adversarial attack on semantic similarity. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 15315–15324, 2022.
- Song et al. [2018] Y. Song, R. Shu, N. Kushman, and S. Ermon. Constructing unrestricted adversarial examples with generative models. Advances in neural information processing systems, 31, 2018.
- Ho et al. [2020] J. Ho, A. Jain, and P. Abbeel. Denoising diffusion probabilistic models. Advances in neural information processing systems, 33:6840–6851, 2020.
- Song et al. [2020a] J. Song, C. Meng, and S. Ermon. Denoising diffusion implicit models. In International Conference on Learning Representations, 2020a.
- Rombach et al. [2022] R. Rombach, A. Blattmann, D. Lorenz, P. Esser, and B. Ommer. High-resolution image synthesis with latent diffusion models. In Proceedings of the IEEE/CVF Conference on Computer Cision and Pattern Recognition, pages 10684–10695, 2022.
- Chen et al. [2023b] X. Chen, X. Gao, J. Zhao, K. Ye, and C. Xu. Advdiffuser: Natural adversarial example synthesis with diffusion models. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 4562–4572, 2023b.
- Xue et al. [2023] H. Xue, A. Araujo, B. Hu, and Y. Chen. Diffusion-based adversarial sample generation for improved stealthiness and controllability. In Thirty-seventh Conference on Neural Information Processing Systems, 2023.
- Chen et al. [2023c] J. Chen, H. Chen, K. Chen, Y. Zhang, Z. Zou, and Z. Shi. Diffusion models for imperceptible and transferable adversarial attack. arXiv preprint arXiv:2305.08192, 2023c.
- Chen et al. [2024] Z. Chen, B. Li, S. Wu, K. Jiang, S. Ding, and W. Zhang. Content-based unrestricted adversarial attack. Advances in Neural Information Processing Systems, 36, 2024.
- Dhariwal and Nichol [2021] P. Dhariwal and A. Nichol. Diffusion models beat gans on image synthesis. Advances in neural information processing systems, 34:8780–8794, 2021.
- Song et al. [2020b] Y. Song, J. Sohl-Dickstein, D. P. Kingma, A. Kumar, S. Ermon, and B. Poole. Score-based generative modeling through stochastic differential equations. In International Conference on Learning Representations, 2020b.
- Song and Ermon [2019] Y. Song and S. Ermon. Generative modeling by estimating gradients of the data distribution. Advances in neural information processing systems, 32, 2019.
- Zhou et al. [2016] B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba. Learning deep features for discriminative localization. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 2921–2929, 2016.
- Selvaraju et al. [2017] R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, and D. Batra. Grad-cam: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE International Conference on Computer Vision, pages 618–626, 2017.
- Krizhevsky et al. [2012] A. Krizhevsky, I. Sutskever, and G. E Hinton. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25, 2012.
- Ioffe and Szegedy [2015] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning, pages 448–456. pmlr, 2015.
- Yuan et al. [2022] S. Yuan, Q. Zhang, L. Gao, Y. Cheng, and J. Song. Natural color fool: Towards boosting black-box unrestricted attacks. Advances in Neural Information Processing Systems, 35:7546–7560, 2022.
- Russakovsky et al. [2015] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, et al. Imagenet large scale visual recognition challenge. International journal of computer vision, 115:211–252, 2015.
- He et al. [2016] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer VVision and pattern recognition, pages 770–778, 2016.
- Liu et al. [2022] Z. Liu, H. Mao, C. Y. Wu, C. Feichtenhofer, T. Darrell, and S. Xie. A convnet for the 2020s. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 11976–11986, 2022.
- Liu et al. [2021] Z. Liu, Y. Lin, Y. Cao, H. Hu, Y. Wei, Z. Zhang, S. Lin, and B. Guo. Swin transformer: Hierarchical vision transformer using shifted windows. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 10012–10022, 2021.
- Vaswani et al. [2017] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Łukasz Kaiser, and Illia Polosukhin. Attention is all you need. Advances in neural information processing systems, 30, 2017.
- Zhu et al. [2024] L. Zhu, B. Liao, Q. Zhang, X. Wang, W. Liu, and X. Wang. Vision mamba: Efficient visual representation learning with bidirectional state space model. In International conference on machine learning, 2024.
- Gu and Dao [2023] A. Gu and T. Dao. Mamba: Linear-time sequence modeling with selective state spaces. arXiv preprint arXiv:2312.00752, 2023.
- Wang et al. [2004] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4):600–612, 2004.
- Zhang et al. [2018] R. Zhang, P. Isola, A. A. Efros, E. Shechtman, and O. Wang. The unreasonable effectiveness of deep features as a perceptual metric. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 586–595, 2018.
- Heusel et al. [2017] M. Heusel, H. Ramsauer, T. Unterthiner, B. Nessler, and S. Hochreiter. Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in neural information processing systems, 30, 2017.
- Ke et al. [2021] J. Ke, Q. Wang, Y. Wang, P. Milanfar, and F. Yang. Musiq: Multi-scale image quality transformer. In Proceedings of the IEEE/CVF international conference on computer vision, pages 5148–5157, 2021.
- Salman et al. [2020b] H. Salman, M. Sun, G. Yang, A. Kapoor, and J Z. Kolter. Denoised smoothing: A provable defense for pretrained classifiers. Advances in Neural Information Processing Systems, 33:21945–21957, 2020b.
- Liu et al. [2023] C. Liu, Y. Dong, W. Xiang, X. Yang, H. Su, J. Zhu, Y. Chen, Y. He, H. Xue, and S. Zheng. A comprehensive study on robustness of image classification models: Benchmarking and rethinking. arXiv preprint arXiv:2302.14301, 2023.
- Das et al. [2018] N. Das, M. Shanbhogue, S. Chen, F. Hohman, S. Li, L. Chen, M. E. Kounavis, and D. Chau. Shield: Fast, practical defense and vaccination for deep learning using jpeg compression. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pages 196–204, 2018.
- Guo et al. [2018] C. Guo, M. Rana, M. Cisse, and L. van der Maaten. Countering adversarial images using input transformations. In International Conference on Learning Representations, 2018.
- Sandler et al. [2018] M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L. Chen. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 4510–4520, 2018.
Contents
Appendix A Related Work
Beginning with the attack paradigm of Fast Gradient Sign Method (FGSM) [2], there are numerous great works focusing on the imperceptibility of adversarial attacks have been proposed [17, 18, 19, 20, 21, 22, 23]. In contrast to another line of attacks aimed at improving the attack success rate and the transferability for black-box models with a more lenient limitation of perturbation strength [13, 14, 15], imperceptible adversarial attacks are dedicate to accomplish attacks using as minimal perturbation as possible while deceiving human perception. Among them, PerC-AL [19] improves the imperceptibility by alternating between the classification loss and perceptual color difference when updating perturbations. AdvDrop [21] uses Discrete Cosine Transform (DCT) to discard details in images that are imperceptible for humans. SSAH [24] limits perturbation to high-frequency components using Discrete Wavelet Transform (DWT) to make it undetectable. Similarly, AdvINN [22] also utilizes the DWT and exploits invertible neural networks to specially perform targeted attacks. In addition, with an unrestriced setting [25], some recent works have incorporated the capabilities of generative models (e.g., diffusion models [26]) into common attack frameworks to make adversarial examples more natural and enhance the imperceptibility. DiffAttack [31] and ACA [32] combine the optimization of adversarial losses with the Stable Diffusion [28] to generate unrestricted adversarial examples, while Diff-PGD [30] and AdvDiffuser [29] incorporate the classic PGD method [12] into the diffusion steps to make the adversarial examples undergo denoising processing.
Compared to these traditional restricted imperceptible attacks or the recent unrestricted imperceptible attacks (e.g., diffusion-based), the proposed AdvAD is a completely novel approach distinct from existing attack paradigms. It is the first pilot framework which innovatively conceptualizes attacking as a non-parametric diffusion process by theoretically exploring fundamental modeling approach of diffusion models rather than using their denoising or generative abilities, achieving high attack efficacy and imperceptibility with intrinsically lower perturbation strength. Following the setting of restricted attack, the modeling of AdvAD is theoretically derived from conditional sampling of diffusion models, supporting its attack performance and imperceptibility, and does not require any loss functions, optimizers, or additional neural networks.
Appendix B Derivations and Proofs
In this section, we first introduce the specific straightforward Pixel-level Constraint (PC) for that is simply mentioned at the beginning of Section 3.3 of the main text as an intuitive preliminary, then we provide the detailed proofs of Theorem 1 and Proposition 1, 2 given in the PC for .
B.1 Straightforward PC for
For each known in the fixed diffusion trajectory of the original image , and modified in the attacking trajectory with the proposed Attacked Model Guidance (AMG) leading to the adversarial example , the objective of PC is to control and constrain these two trajectories to be close, ensuring the final (i.e., ) close to (i.e., ). It is obvious that a straightforward way to achieve the goal by directly constrain every using . Thus, in PC for , we can utilize the restriction of adversarial examples and the relationship between , and to derive the constraint for . Given the budget , the desired restriction of adversarial examples is
(15) |
Next, since the is unconstrained in the case of PC for , we adopt the initialized to calculate approximating as:
(16) |
where , and is a pre-defined decreasing scalar sequence. And the of the original trajectory is calculated as:
(17) |
By substituting Eq. (16) and Eq. (17) into Eq. (15), the constraint for can be easily derived, denoted as:
(18) |
In this way, the PC for can be implemented at the start of each step to achieve the basic restrictions by employing a projection operation to according to Eq. (18). However, this direct modification of at each step obviously disrupts the entire diffusion trajectory from noise to our desired adversarial distribution, and can not achieve the final imperceptibility. Additionally, it is observed that the estimation of in each step employs a fixed , impairing the adversarial guidance crafted by AMG.
B.2 Proof of Theorem 1
Therefore, we carefully analysis the important noise term in our diffusion-based modeling approach for adversarial attacks, and present Theorem 1 to support our PC for as described in the main text. The proof of Theorem 1 is provided as follow.
Theorem 1
Given diffusion coefficients , the , , from the original trajectory, , from the modified trajectory, and a variable , if and satisfies
(19) |
for all , then it follows that hold true.
Proof 1
We prove Theorem 1 using mathematical induction.
Initial case.
For trajectories of the adversarial example and original image that start from , and , we can unfold the formula for computing the with the updated as:
(20) |
For from the fixed trajectory where always equals to , we have:
(21) |
With , Eq. (20), Eq. (21), and the relationship of , we have:
(22) |
Meanwhile, for the relationship between and at the initial step, we have:
(23) | |||||
(24) | |||||
(25) |
where the transition from Eq. (23) to Eq. (24) is obtained with the real constant value of . At this point, it can be seen that Theorem 1 holds in the initial case.
Inductive step.
Assuming the theorem holds for some arbitrary step , where , we have:
(26) |
(27) |
and
(28) |
Based on the inductive hypothesis, we next show the validity of the theorem at step . Similar to Eq.(20), we unfold the calculation of with and as:
(29) |
And the can be denoted as:
(30) |
Consequently, by substituting Eq. (29) and Eq. (30) into , we have:
(31) | |||||
(32) | |||||
(33) |
where Eq. (31) to Eq. (32) utilizes the triangle inequality property of -norm, and Eq. (33) is obtained with Eq. (28). Then, given the imposed condition of Eq. (19), we can get:
(34) |
And the relationship between and at step can be expressed as:
(35) | ||||
(36) | ||||
(37) | ||||
(38) |
where the triangle inequality property is utilized again to obtain Eq. (36) from Eq. (35), then Eq. (28) and Eq. (34) is substituted to obtain Eq. (37). Obviously, for the case of step , it is also consistent with the theorem.
Conclusion.
Therefore, by extending the truth of the theorem from arbitrary step to , and given its established validity at the initial case, the principle of mathematical induction allows us to conclude that hold true for every step . For and , we have and , thus it is obvious that . This concludes the proof of the whole Theorem 1.
B.3 Proof of Proposition 1
Next, we prove Proposition 1 about and by expanding and rearranging the recursive formulas in our diffusion process for attacks.
Proposition 1
Under the conditions of Theorem 1, by denoting constrained , we have
(39) |
where , and .
Proof 2
With Eq. (19) in Theorem 1, by denoting , we have: , and the in the initial step can be written as:
(40) |
Applying the recursion formula twice, we have:
(41) |
Similarly, for , we have:
(42) |
It is obvious that the coefficients of each term exhibit a clear regular pattern related to the step . Following this pattern, we can accordingly get the expression of as:
(43) |
And the final can be expressed as:
(44) |
Note that in Eq. (44), and the coefficients of can be mostly eliminated. Thus, by defining as:
(45) |
we can rearrange Eq. (44) into:
(46) |
where is the final output of the diffusing process and . This concludes the proof of Proposition 1.
B.4 Proof of Proposition 2
Finally, we prove Proposition 2 about the validity and convergence of the approximation .
Proposition 2
Under the conditions of Theorem 1 and Proposition 1, the upper bound on the error of the approximation in Eq. (22) can be expressed as
(47) |
Appendix C Algorithm of AdvAD-X
Input: Attacked model , image with label , budget , step ;
Output: Adversarial example
Appendix D Additional Experiments
D.1 Additional Quantitative Comparisons
Table 4 reports the untargeted attack performance and imperceptibility of ten methods on Vgg-19, MobileNet-V2, and WideResNet-50 models. The results indicate that the proposed AdvAD and AdvAD-X, leveraging a novel modeling framework, consistently achieve superior performance. These findings further underscore the effectiveness of the proposed approach.
Model | Attack Method | Time (s) | ASR () | PSNR | SSIM | FID | LPIPS | MUSIQ | ||
Vgg-19 | PGD | 47 | 100.0 | 0.031 | 8.47 | 33.23 | 0.8771 | 43.15 | 0.0508 | 53.51 |
NCF | 3288 | 92.8 | 0.794 | 75.21 | 14.77 | 0.6391 | 57.45 | 0.3077 | 49.27 | |
ACA | 83123 | 93.4 | 0.832 | 51.22 | 18.22 | 0.5767 | 66.78 | 0.3277 | 55.61 | |
DiffAttack | 34163 | 97.0 | 0.769 | 31.92 | 22.23 | 0.6632 | 59.08 | 0.1235 | 57.22 | |
DiffPGD | 5770 | 93.9 | 0.246 | 11.46 | 30.93 | 0.8888 | 20.72 | 0.0317 | 55.23 | |
AdvDrop | 268 | 97.5 | 0.062 | 3.23 | 41.79 | 0.9867 | 5.90 | 0.0061 | 54.93 | |
PerC-AL | 8671 | 100.0 | 0.142 | 2.12 | 45.92 | 0.9885 | 10.78 | 0.0028 | 55.91 | |
SSAH | 948 | 85.5 | 0.027 | 2.35 | 44.62 | 0.9920 | 4.25 | 0.0017 | 55.45 | |
AdvAD (ours) | 4370 | 99.5 | 0.009 | 1.05 | 52.13 | 0.9979 | 2.62 | 0.0005 | 56.31 | |
1967 | 99.9 | 0.001 | 0.32 | 64.76 | 0.9997 | 0.27 | 0.0001 | 56.56 | ||
MobileNet-V2 | PGD | 10 | 99.9 | 0.031 | 8.29 | 33.41 | 0.8803 | 34.57 | 0.0500 | 52.00 |
NCF | 2503 | 92.5 | 0.784 | 76.02 | 14.69 | 0.6373 | 56.23 | 0.3090 | 49.37 | |
ACA | 83118 | 92.8 | 0.835 | 50.70 | 18.30 | 0.5786 | 64.90 | 0.3254 | 56.17 | |
DiffAttack | 34723 | 98.2 | 0.739 | 30.51 | 22.61 | 0.6733 | 55.77 | 0.1143 | 56.01 | |
DiffPGD | 5941 | 92.6 | 0.246 | 11.43 | 30.95 | 0.8887 | 19.22 | 0.0309 | 54.87 | |
AdvDrop | 116 | 97.7 | 0.063 | 3.16 | 41.94 | 0.9873 | 4.88 | 0.0064 | 54.91 | |
PerC-AL | 3187 | 99.8 | 0.118 | 2.16 | 45.67 | 0.9879 | 8.77 | 0.0032 | 55.59 | |
SSAH | 265 | 97.8 | 0.026 | 2.18 | 45.24 | 0.9930 | 2.94 | 0.0016 | 55.78 | |
AdvAD (ours) | 992 | 99.6 | 0.008 | 0.94 | 53.07 | 0.9982 | 1.46 | 0.0004 | 56.37 | |
388 | 100.0 | 0.001 | 0.24 | 66.8 | 0.9998 | 0.11 | 0.0001 | 56.59 | ||
WideResNet-50 | PGD | 42 | 96.0 | 0.031 | 8.2 | 33.5 | 0.8830 | 35.594 | 0.0521 | 52.43 |
NCF | 2971 | 89.7 | 0.777 | 74.05 | 14.98 | 0.6473 | 56.01 | 0.2965 | 49.45 | |
ACA | 84163 | 88.0 | 0.838 | 53.17 | 17.89 | 0.5619 | 68.27 | 0.3442 | 55.47 | |
DiffAttack | 34072 | 95.1 | 0.747 | 30.61 | 22.60 | 0.6737 | 54.71 | 0.1137 | 55.68 | |
DiffPGD | 5965 | 91.4 | 0.245 | 11.44 | 30.95 | 0.8905 | 21.24 | 0.0317 | 55.16 | |
AdvDrop | 353 | 96.5 | 0.062 | 3.28 | 41.64 | 0.9863 | 6.21 | 0.0060 | 54.917 | |
PerC-AL | 6655 | 97.8 | 0.133 | 1.91 | 46.80 | 0.9906 | 9.28 | 0.0025 | 56.07 | |
SSAH | 738 | 95.7 | 0.028 | 2.21 | 45.21 | 0.9933 | 3.95 | 0.0015 | 55.88 | |
AdvAD (ours) | 3845 | 99.9 | 0.010 | 1.10 | 51.54 | 0.9979 | 2.84 | 0.0006 | 56.33 | |
1477 | 100.0 | 0.002 | 0.38 | 62.54 | 0.9996 | 0.33 | 0.0001 | 56.58 |
D.2 Additional Visualizations
More visualizations of adversarial examples and perturbations under the attacked model of ResNet-50 are displayed in Figure 8. The visualizations provide a clear insight into how different methods accomplish imperceptible attacks. Our AdvAD and AdvAD-X methods execute imperceptible attacks with lower overall intensity of perturbations. Notably, for images with salient objects (e.g., the bridge in the second examples), the perturbation intensity of AdvAD also naturally increases in the object regions during the gradient-based adversarial guidance calculation, while AdvAD-X, equipped with the dynamic strategy, still shows uniform and lower overall perturbation intensity.






D.3 Ablation Study of AdvAD-X
From AdvAD to AdvAD-X, Table 5 shows the effect of the two strategies of CA and DGI. It can be observed that adding CA in each step of AdvAD slightly improves impercepbility while maintaining the attack success rate of 100%. However, the DGI strategy significantly reduces the iterations of performing AMG and PC from 1000 to 3.97, which indicates that our framework theoretically only requires very little injected adversarial guidance to successfully perform attacks, proving the performance of our modeling method as well as the effectiveness of the adversarial guidance. In AdvAD-X, which finally uses both CA and DGI, the guidance strength in each step is further suppressed, resulting in a slight increase in the total number of iterations required adaptively, but the final perturbation strength continues to decrease to a more extreme level.
Attack | Iter. | ASR | PSNR | SSIM | FID | |
1000 | 100.0 | 0.97 | 52.60 | 0.9984 | 2.3894 | |
1000 | 100.0 | 0.89 | 53.27 | 0.9987 | 2.2033 | |
3.97 | 100.0 | 0.34 | 63.60 | 0.9997 | 0.2317 | |
4.05 | 100.0 | 0.34 | 63.62 | 0.9997 | 0.2301 |
D.4 Additional Discussions
Discussion on Proposition 1. In the previous sections, we obtained Proposition 1 through extensive derivations, which reformulates the AdvAD attack process using and . While this formulation does not represent the actual attack procedure, it enables post-analysis after the completion of attacks. In Proposition 1, although the upper bound of is theoretically independent of the step , both and the coefficient gradually decrease with in quantitative results of Figure 7 due to the unique properties of AdvAD. Thus, it emerges a hypothesis that whether modifying the coefficient of gradient term of traditional attacks like PGD to decay incrementally could also achieve the imperceptibility. To isolate the impact of this hypothesis, we conduct experiments with a modified version of PGD with step size decay as:
(53) |
where is the same coefficient as in Eq. (39) of Proposition 1 for alignment, and is a fixed small factor for the initial step size. We have searched a lot of values of to determine the optimal range, and the results of attacking three models with different architectures under three typical values of are presented in Table 6.
Model | Attack Method | Param. | Time | ASR | PSNR | SSIM | ||
ResNet-50 | PGD + Step size decay in Eq. (53), = 5e-5 | =1000, =8/255 | 2272 | 99.9 | 0.016 | 1.80 | 46.75 | 0.9947 |
PGD + Step size decay in Eq. (53), = 3e-5 | 2228 | 99.0 | 0.008 | 1.17 | 50.41 | 0.9974 | ||
PGD + Step size decay in Eq. (53), = 1e-5 | 2306 | 7.1 | - | - | - | - | ||
AdvAD (ours) | 2201 | 99.7 | 0.010 | 1.06 | 51.84 | 0.998 | ||
Swin-Base | PGD + Step size decay in Eq. (53), = 5e-5 | =1000, =8/255 | 8725 | 98.0 | 0.008 | 1.28 | 49.88 | 0.9975 |
PGD + Step size decay in Eq. (53), = 3e-5 | 8728 | 89.1 | 0.004 | 0.94 | 52.47 | 0.9985 | ||
PGD + Step size decay in Eq. (53), = 1e-5 | 8715 | 3.9 | - | - | - | - | ||
AdvAD (ours) | 9729 | 100 | 0.013 | 1.19 | 50.57 | 0.9978 | ||
VisionMamba-Small | PGD + Step size decay in Eq. (53), = 5e-5 | =1000, =8/255 | 6350 | 89.2 | 0.008 | 1.63 | 47.76 | 0.9959 |
PGD + Step size decay in Eq. (53), = 3e-5 | 6393 | 78.3 | 0.004 | 1.10 | 51.05 | 0.9979 | ||
PGD + Step size decay in Eq. (53), = 1e-5 | 6348 | 2.5 | - | - | - | - | ||
AdvAD (ours) | 6154 | 99.7 | 0.016 | 1.62 | 47.94 | 0.9960 |
It can be observed that for PGD with this strategy, the ASR is clearly proportional to , the imperceptibility is inversely proportional to . However, regardless of how is adjusted, this strategy can not simultaneously match AdvAD in both ASR and imperceptibility. Firstly, for = 5e-5, when attacking VisionMamba, ASR of this strategy is 10.5 lower than AdvAD with close PSNR, and the strategy has a 0.2 higher ASR but a 5.09 dB lower PSNR for ResNet50. For = 3e-5, the ASR against VisionMamba and Swin further degrade, being 10.9 and 21.4 lower than AdvAD, respectively. Finally, for = 1e-5, the modified PGD with step size decay fails to attack all the models. Nevertheless, although this step size decay strategy performs worse than our AdvAD, it indeed enhances the imperceptibility of attacks compared to the original PGD in some cases, which further validates our motivation and modeling approach. This is because, while this strategy follows a completely different technical route than AdvAD, it similarly uses subtler perturbations to progressively push adversarial examples closer to the model’s decision boundary. To this end, we leave further research on the potential of this strategy to future work.
Limitation. As the primary focus of AdvAD is the imperceptibility, although it achieves better transferability at lower perturbation strength compared with other restricted imperceptible attacks, its transferability is inevitably weaker than other black-box attack methods that operate in larger perturbation spaces and are specifically designed for transferability (like the unrestricted ones). However, the proposed AdvAD is essentially a general attack paradigm with a novel modeling approach and a solid theoretical foundation. By relaxing the constraint of perturbation strength and incorporating enhanced designs for the transferability into the proposed framework of non-parametric diffusion process, AdvAD also has significant potential to be modified into a specific black-box attack, and we also leave this aspect for future research.
NeurIPS Paper Checklist
-
1.
Claims
-
Question: Do the main claims made in the abstract and introduction accurately reflect the paper’s contributions and scope?
-
Answer: [Yes]
-
Justification: We present the motivation, innovation, overview of methods, experimental performance and the main contributions of our paper in the abstract and introduction. These claims are further explained and verified in Sec. 3 and Sec. 4, and detailed proofs are given in Appendix.
-
Guidelines:
-
•
The answer NA means that the abstract and introduction do not include the claims made in the paper.
-
•
The abstract and/or introduction should clearly state the claims made, including the contributions made in the paper and important assumptions and limitations. A No or NA answer to this question will not be perceived well by the reviewers.
-
•
The claims made should match theoretical and experimental results, and reflect how much the results can be expected to generalize to other settings.
-
•
It is fine to include aspirational goals as motivation as long as it is clear that these goals are not attained by the paper.
-
•
-
2.
Limitations
-
Question: Does the paper discuss the limitations of the work performed by the authors?
-
Answer: [Yes]
-
Justification: For the proposed AdvAD that mainly focuses on the imperceptibility, we point that there is a trade-off between the imperceptibility and transferability for the restricted attacks. The relevant discussions and experimental results are given in Sec. 3.4, Sec. 4.3, and Appendix D.4. Additionally, for the proposed AdvAD-X, although it shows amazing performance under an ideal scenario using raw floating-point data for attacking and brings theoretical value, the very small floating-point perturbations will be easily erased by the quantization process when the image is actually stored.
-
Guidelines:
-
•
The answer NA means that the paper has no limitation while the answer No means that the paper has limitations, but those are not discussed in the paper.
-
•
The authors are encouraged to create a separate "Limitations" section in their paper.
-
•
The paper should point out any strong assumptions and how robust the results are to violations of these assumptions (e.g., independence assumptions, noiseless settings, model well-specification, asymptotic approximations only holding locally). The authors should reflect on how these assumptions might be violated in practice and what the implications would be.
-
•
The authors should reflect on the scope of the claims made, e.g., if the approach was only tested on a few datasets or with a few runs. In general, empirical results often depend on implicit assumptions, which should be articulated.
-
•
The authors should reflect on the factors that influence the performance of the approach. For example, a facial recognition algorithm may perform poorly when image resolution is low or images are taken in low lighting. Or a speech-to-text system might not be used reliably to provide closed captions for online lectures because it fails to handle technical jargon.
-
•
The authors should discuss the computational efficiency of the proposed algorithms and how they scale with dataset size.
-
•
If applicable, the authors should discuss possible limitations of their approach to address problems of privacy and fairness.
-
•
While the authors might fear that complete honesty about limitations might be used by reviewers as grounds for rejection, a worse outcome might be that reviewers discover limitations that aren’t acknowledged in the paper. The authors should use their best judgment and recognize that individual actions in favor of transparency play an important role in developing norms that preserve the integrity of the community. Reviewers will be specifically instructed to not penalize honesty concerning limitations.
-
•
-
3.
Theory Assumptions and Proofs
-
Question: For each theoretical result, does the paper provide the full set of assumptions and a complete (and correct) proof?
-
Answer: [Yes]
-
Justification: The proposed attack method is built on a solid theoretical foundation, which is derived from the derivation of the diffusion models. The specific methods and theoretical properties are introduced in detail in Sec. 3, and the detailed proofs of the proposed theorem and two propositions are given in Appendix.
-
Guidelines:
-
•
The answer NA means that the paper does not include theoretical results.
-
•
All the theorems, formulas, and proofs in the paper should be numbered and cross-referenced.
-
•
All assumptions should be clearly stated or referenced in the statement of any theorems.
-
•
The proofs can either appear in the main paper or the supplemental material, but if they appear in the supplemental material, the authors are encouraged to provide a short proof sketch to provide intuition.
-
•
Inversely, any informal proof provided in the core of the paper should be complemented by formal proofs provided in appendix or supplemental material.
-
•
Theorems and Lemmas that the proof relies upon should be properly referenced.
-
•
-
4.
Experimental Result Reproducibility
-
Question: Does the paper fully disclose all the information needed to reproduce the main experimental results of the paper to the extent that it affects the main claims and/or conclusions of the paper (regardless of whether the code and data are provided or not)?
-
Answer: [Yes]
-
Justification: We present all the formulas, calculation processes, algorithms, and hyperparameters of the proposed methods in detail. And we have tested that by fixing the random seed, our method can produce consistent results with the same input on our machine, providing good reproducibility.
-
Guidelines:
-
•
The answer NA means that the paper does not include experiments.
-
•
If the paper includes experiments, a No answer to this question will not be perceived well by the reviewers: Making the paper reproducible is important, regardless of whether the code and data are provided or not.
-
•
If the contribution is a dataset and/or model, the authors should describe the steps taken to make their results reproducible or verifiable.
-
•
Depending on the contribution, reproducibility can be accomplished in various ways. For example, if the contribution is a novel architecture, describing the architecture fully might suffice, or if the contribution is a specific model and empirical evaluation, it may be necessary to either make it possible for others to replicate the model with the same dataset, or provide access to the model. In general. releasing code and data is often one good way to accomplish this, but reproducibility can also be provided via detailed instructions for how to replicate the results, access to a hosted model (e.g., in the case of a large language model), releasing of a model checkpoint, or other means that are appropriate to the research performed.
-
•
While NeurIPS does not require releasing code, the conference does require all submissions to provide some reasonable avenue for reproducibility, which may depend on the nature of the contribution. For example
-
(a)
If the contribution is primarily a new algorithm, the paper should make it clear how to reproduce that algorithm.
-
(b)
If the contribution is primarily a new model architecture, the paper should describe the architecture clearly and fully.
-
(c)
If the contribution is a new model (e.g., a large language model), then there should either be a way to access this model for reproducing the results or a way to reproduce the model (e.g., with an open-source dataset or instructions for how to construct the dataset).
-
(d)
We recognize that reproducibility may be tricky in some cases, in which case authors are welcome to describe the particular way they provide for reproducibility. In the case of closed-source models, it may be that access to the model is limited in some way (e.g., to registered users), but it should be possible for other researchers to have some path to reproducing or verifying the results.
-
(a)
-
•
-
5.
Open access to data and code
-
Question: Does the paper provide open access to the data and code, with sufficient instructions to faithfully reproduce the main experimental results, as described in supplemental material?
-
Answer: [Yes]
-
Justification: We open-source the code on GitHub and give the Python environment requirements, dataset preparation, running commands, etc. Following our instructions, the experimental results given in the paper can be easily reproduced.
-
Guidelines:
-
•
The answer NA means that paper does not include experiments requiring code.
-
•
Please see the NeurIPS code and data submission guidelines (https://nips.cc/public/guides/CodeSubmissionPolicy) for more details.
-
•
While we encourage the release of code and data, we understand that this might not be possible, so “No” is an acceptable answer. Papers cannot be rejected simply for not including code, unless this is central to the contribution (e.g., for a new open-source benchmark).
-
•
The instructions should contain the exact command and environment needed to run to reproduce the results. See the NeurIPS code and data submission guidelines (https://nips.cc/public/guides/CodeSubmissionPolicy) for more details.
-
•
The authors should provide instructions on data access and preparation, including how to access the raw data, preprocessed data, intermediate data, and generated data, etc.
-
•
The authors should provide scripts to reproduce all experimental results for the new proposed method and baselines. If only a subset of experiments are reproducible, they should state which ones are omitted from the script and why.
-
•
At submission time, to preserve anonymity, the authors should release anonymized versions (if applicable).
-
•
Providing as much information as possible in supplemental material (appended to the paper) is recommended, but including URLs to data and code is permitted.
-
•
-
6.
Experimental Setting/Details
-
Question: Does the paper specify all the training and test details (e.g., data splits, hyperparameters, how they were chosen, type of optimizer, etc.) necessary to understand the results?
-
Answer: [Yes]
-
Justification: One of the main contributions of our paper is to propose a novel adversarial attack modeling framework based on a non-parametric diffusion process. Benefiting from the proposed modeling approach, our attack method only needs two simple hyperparameters to accurately control the entire attack process, without the need for complex training or optimization processes in other paradigms.
-
Guidelines:
-
•
The answer NA means that the paper does not include experiments.
-
•
The experimental setting should be presented in the core of the paper to a level of detail that is necessary to appreciate the results and make sense of them.
-
•
The full details can be provided either with the code, in appendix, or as supplemental material.
-
•
-
7.
Experiment Statistical Significance
-
Question: Does the paper report error bars suitably and correctly defined or other appropriate information about the statistical significance of the experiments?
-
Answer: [No]
-
Justification: Only Figure 5 reports a actual statistic numerical curve of a theoretical upper bound in the actual execution process, which is calculated from actual data using a confidence level of 0.85 and shows the confidence interval. In other experiments, due to limited computing resources, the error bar under multiple runs is not included. However, as mentioned above, the methods proposed in this paper can obtain consistent results in multiple runs by fixing the random seed.
-
Guidelines:
-
•
The answer NA means that the paper does not include experiments.
-
•
The authors should answer "Yes" if the results are accompanied by error bars, confidence intervals, or statistical significance tests, at least for the experiments that support the main claims of the paper.
-
•
The factors of variability that the error bars are capturing should be clearly stated (for example, train/test split, initialization, random drawing of some parameter, or overall run with given experimental conditions).
-
•
The method for calculating the error bars should be explained (closed form formula, call to a library function, bootstrap, etc.)
-
•
The assumptions made should be given (e.g., Normally distributed errors).
-
•
It should be clear whether the error bar is the standard deviation or the standard error of the mean.
-
•
It is OK to report 1-sigma error bars, but one should state it. The authors should preferably report a 2-sigma error bar than state that they have a 96% CI, if the hypothesis of Normality of errors is not verified.
-
•
For asymmetric distributions, the authors should be careful not to show in tables or figures symmetric error bars that would yield results that are out of range (e.g. negative error rates).
-
•
If error bars are reported in tables or plots, The authors should explain in the text how they were calculated and reference the corresponding figures or tables in the text.
-
•
-
8.
Experiments Compute Resources
-
Question: For each experiment, does the paper provide sufficient information on the computer resources (type of compute workers, memory, time of execution) needed to reproduce the experiments?
-
Answer: [Yes]
-
Justification: We have indicated that all the experiments are conducted on a single NVIDIA RTX 3090 GPU, and the running time required for all methods to attack different models are included in Table 1, Table 5, and Table 8 to compare the computational complexity while providing a reference.
-
Guidelines:
-
•
The answer NA means that the paper does not include experiments.
-
•
The paper should indicate the type of compute workers CPU or GPU, internal cluster, or cloud provider, including relevant memory and storage.
-
•
The paper should provide the amount of compute required for each of the individual experimental runs as well as estimate the total compute.
-
•
The paper should disclose whether the full research project required more compute than the experiments reported in the paper (e.g., preliminary or failed experiments that didn’t make it into the paper).
-
•
-
9.
Code Of Ethics
-
Question: Does the research conducted in the paper conform, in every respect, with the NeurIPS Code of Ethics https://neurips.cc/public/EthicsGuidelines?
-
Answer: [Yes]
-
Justification: We ensure that the research conducted in the paper complies with the NeurIPS Code of Ethics in all respects.
-
Guidelines:
-
•
The answer NA means that the authors have not reviewed the NeurIPS Code of Ethics.
-
•
If the authors answer No, they should explain the special circumstances that require a deviation from the Code of Ethics.
-
•
The authors should make sure to preserve anonymity (e.g., if there is a special consideration due to laws or regulations in their jurisdiction).
-
•
-
10.
Broader Impacts
-
Question: Does the paper discuss both potential positive societal impacts and negative societal impacts of the work performed?
-
Answer: [Yes]
-
Justification: As a research on adversarial attacks of deep neural networks, the significance lies in revealing possible attack algorithms and the vulnerabilities of the models in advance, in order to help promote corresponding defense methods or the model robustness, and improve the safety of deep neural networks in real-world applications.
-
Guidelines:
-
•
The answer NA means that there is no societal impact of the work performed.
-
•
If the authors answer NA or No, they should explain why their work has no societal impact or why the paper does not address societal impact.
-
•
Examples of negative societal impacts include potential malicious or unintended uses (e.g., disinformation, generating fake profiles, surveillance), fairness considerations (e.g., deployment of technologies that could make decisions that unfairly impact specific groups), privacy considerations, and security considerations.
-
•
The conference expects that many papers will be foundational research and not tied to particular applications, let alone deployments. However, if there is a direct path to any negative applications, the authors should point it out. For example, it is legitimate to point out that an improvement in the quality of generative models could be used to generate deepfakes for disinformation. On the other hand, it is not needed to point out that a generic algorithm for optimizing neural networks could enable people to train models that generate Deepfakes faster.
-
•
The authors should consider possible harms that could arise when the technology is being used as intended and functioning correctly, harms that could arise when the technology is being used as intended but gives incorrect results, and harms following from (intentional or unintentional) misuse of the technology.
-
•
If there are negative societal impacts, the authors could also discuss possible mitigation strategies (e.g., gated release of models, providing defenses in addition to attacks, mechanisms for monitoring misuse, mechanisms to monitor how a system learns from feedback over time, improving the efficiency and accessibility of ML).
-
•
-
11.
Safeguards
-
Question: Does the paper describe safeguards that have been put in place for responsible release of data or models that have a high risk for misuse (e.g., pretrained language models, image generators, or scraped datasets)?
-
Answer: [N/A]
-
Justification: The paper poses no such risks.
-
Guidelines:
-
•
The answer NA means that the paper poses no such risks.
-
•
Released models that have a high risk for misuse or dual-use should be released with necessary safeguards to allow for controlled use of the model, for example by requiring that users adhere to usage guidelines or restrictions to access the model or implementing safety filters.
-
•
Datasets that have been scraped from the Internet could pose safety risks. The authors should describe how they avoided releasing unsafe images.
-
•
We recognize that providing effective safeguards is challenging, and many papers do not require this, but we encourage authors to take this into account and make a best faith effort.
-
•
-
12.
Licenses for existing assets
-
Question: Are the creators or original owners of assets (e.g., code, data, models), used in the paper, properly credited and are the license and terms of use explicitly mentioned and properly respected?
-
Answer: [Yes]
-
Justification: The dataset we used is under the MIT License, and it has been properly cited in the paper with its URL.
-
Guidelines:
-
•
The answer NA means that the paper does not use existing assets.
-
•
The authors should cite the original paper that produced the code package or dataset.
-
•
The authors should state which version of the asset is used and, if possible, include a URL.
-
•
The name of the license (e.g., CC-BY 4.0) should be included for each asset.
-
•
For scraped data from a particular source (e.g., website), the copyright and terms of service of that source should be provided.
-
•
If assets are released, the license, copyright information, and terms of use in the package should be provided. For popular datasets, paperswithcode.com/datasets has curated licenses for some datasets. Their licensing guide can help determine the license of a dataset.
-
•
For existing datasets that are re-packaged, both the original license and the license of the derived asset (if it has changed) should be provided.
-
•
If this information is not available online, the authors are encouraged to reach out to the asset’s creators.
-
•
-
13.
New Assets
-
Question: Are new assets introduced in the paper well documented and is the documentation provided alongside the assets?
-
Answer: [N/A]
-
Justification: The paper does not release new assets.
-
Guidelines:
-
•
The answer NA means that the paper does not release new assets.
-
•
Researchers should communicate the details of the dataset/code/model as part of their submissions via structured templates. This includes details about training, license, limitations, etc.
-
•
The paper should discuss whether and how consent was obtained from people whose asset is used.
-
•
At submission time, remember to anonymize your assets (if applicable). You can either create an anonymized URL or include an anonymized zip file.
-
•
-
14.
Crowdsourcing and Research with Human Subjects
-
Question: For crowdsourcing experiments and research with human subjects, does the paper include the full text of instructions given to participants and screenshots, if applicable, as well as details about compensation (if any)?
-
Answer: [N/A]
-
Justification: The paper does not involve crowdsourcing nor research with human subjects.
-
Guidelines:
-
•
The answer NA means that the paper does not involve crowdsourcing nor research with human subjects.
-
•
Including this information in the supplemental material is fine, but if the main contribution of the paper involves human subjects, then as much detail as possible should be included in the main paper.
-
•
According to the NeurIPS Code of Ethics, workers involved in data collection, curation, or other labor should be paid at least the minimum wage in the country of the data collector.
-
•
-
15.
Institutional Review Board (IRB) Approvals or Equivalent for Research with Human Subjects
-
Question: Does the paper describe potential risks incurred by study participants, whether such risks were disclosed to the subjects, and whether Institutional Review Board (IRB) approvals (or an equivalent approval/review based on the requirements of your country or institution) were obtained?
-
Answer: [N/A]
-
Justification: The paper does not involve crowdsourcing nor research with human subjects.
-
Guidelines:
-
•
The answer NA means that the paper does not involve crowdsourcing nor research with human subjects.
-
•
Depending on the country in which research is conducted, IRB approval (or equivalent) may be required for any human subjects research. If you obtained IRB approval, you should clearly state this in the paper.
-
•
We recognize that the procedures for this may vary significantly between institutions and locations, and we expect authors to adhere to the NeurIPS Code of Ethics and the guidelines for their institution.
-
•
For initial submissions, do not include any information that would break anonymity (if applicable), such as the institution conducting the review.
-
•