Robustness with query-efficient adversarial attack using reinforcement learning

S Sarkar, AR Babu, S Mousavi… - Proceedings of the …, 2023 - openaccess.thecvf.com
A measure of robustness against naturally occurring distortions is key to safety, success, and
trustworthiness of machine learning models on deployment. We propose an adversarial …

Reinforcement learning based black-box adversarial attack for robustness improvement

S Sarkar, AR Babu, S Mousavi… - 2023 IEEE 19th …, 2023 - ieeexplore.ieee.org
We propose a Reinforcement Learning (RL) based adversarial Black-box attack (RLAB) that
aims at adding minimum distortion to the input iteratively to deceive image classification …

[PDF][PDF] Robustness with Black-Box Adversarial Attack using Reinforcement Learning.

S Sarkar, AR Babu, S Mousavi, V Gundecha… - SafeAI@ AAAI, 2023 - ceur-ws.org
A measure of robustness against naturally occurring distortions is key to the safety, success,
and trustworthiness of machine learning models on deployment. We investigate an …

Attacks in adversarial machine learning: A systematic survey from the life-cycle perspective

B Wu, Z Zhu, L Liu, Q Liu, Z He, S Lyu - arXiv preprint arXiv:2302.09457, 2023 - arxiv.org
Adversarial machine learning (AML) studies the adversarial phenomenon of machine
learning, which may make inconsistent or unexpected predictions with humans. Some …

Measuring robustness with black-box adversarial attack using reinforcement learning

S Sarkar, S Mousavi, AR Babu… - NeurIPS ML Safety …, 2022 - openreview.net
A measure of robustness against naturally occurring distortions is key to the trustworthiness,
safety, and success of machine learning models on deployment. We investigate an …

Hard-label based small query black-box adversarial attack

J Park, P Miller, N McLaughlin - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
We consider the hard-label based black-box adversarial attack setting which solely
observes the target model's predicted class. Most of the attack methods in this setting suffer …

UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples

Z Li, W Wang, J Li, K Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Generating transferable adversarial examples is a challenging issue in adversarial attacks.
Existing works on transferable adversarial examples generation mainly focus on models …

Data-free Black-box Attack based on Diffusion Model

M Shao, L Meng, Y Qiao, L Zhang, W Zuo - arXiv preprint arXiv …, 2023 - arxiv.org
Since the training data for the target model in a data-free black-box attack is not available,
most recent schemes utilize GANs to generate data for training substitute model. However …

Frequency-constrained transferable adversarial attack on image manipulation detection and localization

Y Zeng, CM Pun - The Visual Computer, 2024 - Springer
Recent works have demonstrated the great performance of forgery image forensics based
on deep learning, but there is still a risk that detectors could be susceptible to unknown …

Common Knowledge Learning for Generating Transferable Adversarial Examples

R Yang, Y Guo, J Wang, J Zhou, Y Wang - arXiv preprint arXiv:2307.00274, 2023 - arxiv.org
This paper focuses on an important type of black-box attacks, ie, transfer-based adversarial
attacks, where the adversary generates adversarial examples by a substitute (source) model …