Robustness with query-efficient adversarial attack using reinforcement learning
A measure of robustness against naturally occurring distortions is key to safety, success, and
trustworthiness of machine learning models on deployment. We propose an adversarial …
trustworthiness of machine learning models on deployment. We propose an adversarial …
Reinforcement learning based black-box adversarial attack for robustness improvement
We propose a Reinforcement Learning (RL) based adversarial Black-box attack (RLAB) that
aims at adding minimum distortion to the input iteratively to deceive image classification …
aims at adding minimum distortion to the input iteratively to deceive image classification …
[PDF][PDF] Robustness with Black-Box Adversarial Attack using Reinforcement Learning.
A measure of robustness against naturally occurring distortions is key to the safety, success,
and trustworthiness of machine learning models on deployment. We investigate an …
and trustworthiness of machine learning models on deployment. We investigate an …
Attacks in adversarial machine learning: A systematic survey from the life-cycle perspective
Adversarial machine learning (AML) studies the adversarial phenomenon of machine
learning, which may make inconsistent or unexpected predictions with humans. Some …
learning, which may make inconsistent or unexpected predictions with humans. Some …
Measuring robustness with black-box adversarial attack using reinforcement learning
A measure of robustness against naturally occurring distortions is key to the trustworthiness,
safety, and success of machine learning models on deployment. We investigate an …
safety, and success of machine learning models on deployment. We investigate an …
Hard-label based small query black-box adversarial attack
J Park, P Miller, N McLaughlin - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
We consider the hard-label based black-box adversarial attack setting which solely
observes the target model's predicted class. Most of the attack methods in this setting suffer …
observes the target model's predicted class. Most of the attack methods in this setting suffer …
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples
Generating transferable adversarial examples is a challenging issue in adversarial attacks.
Existing works on transferable adversarial examples generation mainly focus on models …
Existing works on transferable adversarial examples generation mainly focus on models …
Data-free Black-box Attack based on Diffusion Model
Since the training data for the target model in a data-free black-box attack is not available,
most recent schemes utilize GANs to generate data for training substitute model. However …
most recent schemes utilize GANs to generate data for training substitute model. However …
Frequency-constrained transferable adversarial attack on image manipulation detection and localization
Y Zeng, CM Pun - The Visual Computer, 2024 - Springer
Recent works have demonstrated the great performance of forgery image forensics based
on deep learning, but there is still a risk that detectors could be susceptible to unknown …
on deep learning, but there is still a risk that detectors could be susceptible to unknown …
Common Knowledge Learning for Generating Transferable Adversarial Examples
This paper focuses on an important type of black-box attacks, ie, transfer-based adversarial
attacks, where the adversary generates adversarial examples by a substitute (source) model …
attacks, where the adversary generates adversarial examples by a substitute (source) model …