Главная
Study mode:
on
1
Intro
2
Adversarial attack (Szegedy et. al. 2013)
3
Motivation
4
Motion picture content rating system
5
Notations
6
Types of adversarial attacks
7
Attack objectives
8
Existing work
9
Implicit representations of boundary (Part 1)
10
An Iterative Algorithm
11
Convergence
12
Black-box setting: Access to decisions alone
13
Boundary search requires labels alone
14
A decision-based gradient direction estimate
15
Intuition of proof
16
A visualization of our algorithm
17
Binary Search: Find boundary of dog & nondog
18
Gradient direction estimation
19
Appropriate size of random perturbation
20
An uneven distribution of signs
21
Variance reduction
22
Distance vs. # Queries
23
Visualization on ImageNet
24
Defense mechanisms under HopSkipJumpAttack
Description:
Explore a comprehensive analysis of HopSkipJumpAttack, a query-efficient decision-based adversarial attack on trained models. Delve into the algorithm's development, theoretical foundations, and practical applications in generating adversarial examples using only output labels. Learn about the novel gradient direction estimation technique utilizing binary information at the decision boundary, and understand how it optimizes for both untargeted and targeted attacks using l_2 and l_∞ similarity metrics. Examine the theoretical analysis behind the proposed algorithms and gradient direction estimate. Discover how HopSkipJumpAttack outperforms state-of-the-art decision-based adversarial attacks in terms of model query efficiency and its effectiveness against widely-used defense mechanisms. Gain insights into various aspects of adversarial attacks, including motivations, notations, types, objectives, and existing work in the field.

HopSkipJumpAttack - A Query-Efficient Decision-Based Attack

IEEE
Add to list
0:00 / 0:00