Using this single query oracle for retrieving sign of directional derivative, we develop a novel query-efficient Sign-OPT approach for hard-label black-box attack. We provide a convergence analysis of the new algorithm and conduct experiments on several models on MNIST, CIFAR-10 and ImageNet. ...
Query-Efficient Hard-label Black-box Attack: An Optimization-based Approach 1、背景介绍 这篇论文是hard-label攻击的第二篇论文,发表于ICLR2019,相比于第一篇boundary attack论文借助于几何边界和随机游走思想,这篇论文采用了优化的思想。更确切的说,他将hard-label问题转换为一个实值优化问题,然后用零阶优化方法...
Query-Efficient Correlation Clustering with Noisy Oracle We study a general clustering setting in which we have n elements to be clustered, and we aim to perform as few queries as possible to an oracle that returns a noisy sample of the weighted similarity between two elements. Our setting enco...
[论文总结] QEBA: Query-Efficient Boundary-Based Blackbox Attack 说在前面 CVPR 2020,原文链接:https://arxiv.org/abs/2005.14137 官方开源代码:https://github.com/AI-secure/QEBA 本文作于2022年06月22日。 1. 解决的问题 对抗样本引起了研究者对人工智能安全的关注。其中,黑盒攻击因为更符合实际场景受到...
EFFICIENT GLOBAL OPTIMIZATION OF EXPENSIVE BLACK-BOX FUNCTIONS 热度: Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures 热度: Towards Optimal Multi-Dimensional Query Processing with Bitmap Indices(具有位图索引的最佳多维查询处理) ...
Flipping Sign Bits is All You Need to Craft Black-Box Adversarial Examples A repository for the query-efficient black-box attack, SignHunter: Sign Bits Are All You Need for Black-Box Attacks by Abdullah Al-Dujaili and Una-May O'Reilly, ICLR 2019 Highlights of the attack: 100% evasion rat...
New constructions for query-efficient locally decod- able codes of subexponential length. CoRR, abs/0810.4576, 2008. 1.1, 2.2.3Toshiya Itoh and Yasuhiro Suzuki. 2010. Improved constructions for query-efficient locally decodable codes of subexponential length. IEICE Transactions 93-D, 2, 263--270....
Using this single query oracle for retrieving sign of directional derivative, we develop a novel query-efficient Sign-OPT approach for hard-label black-box attack. We provide a convergence analysis of the new algorithm and conduct experiments on several models on MNIST, CIFAR-10 and ImageNet. ...
Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)Xiaosen Wang, Zeliang Zhang, Kangheng Tong, Dihong Gong, Kun He, Zhifeng Li, Wei LiuRequirementspython >= 3.6.5 pytorch == 1.7.x numpy >= 1.15.4 imageio >= 2.6.1 torch_dct >= 0.1.5Qucik Start...
Consequently, the query complexity remains high, and such attacks can be defended easily. This study aims to train a generalized substitute model called "Simulator", which can mimic the functionality of any unknown target model. To this end, we build the training data with the form of multiple...