A low-query black-box adversarial attack based on transferability
暂无分享,去创建一个
Xiaosong Zhang | Weina Niu | Teng Hu | Kangyi Ding | Xiaolei Liu | Yanping Wang | Xiaosong Zhang | Weina Niu | Teng Hu | Xiaolei Liu | Kangyi Ding | Yanping Wang
[1] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[2] Wenye Li,et al. AuxBlocks: Defense Adversarial Examples via Auxiliary Blocks , 2019, 2019 International Joint Conference on Neural Networks (IJCNN).
[3] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[4] Xiaosong Zhang,et al. Weighted-Sampling Audio Adversarial Example Attack , 2020, AAAI.
[5] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[6] Jun Zhu,et al. Improving Black-box Adversarial Attacks with a Transfer-based Prior , 2019, NeurIPS.
[7] Demis Hassabis,et al. Mastering the game of Go with deep neural networks and tree search , 2016, Nature.
[8] Yew-Soon Ong,et al. Deep transfer learning for classification of time-delayed Gaussian networks , 2015, Signal Process..
[9] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[10] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[11] Taghi M. Khoshgoftaar,et al. A survey of transfer learning , 2016, Journal of Big Data.
[12] Xiaolei Liu,et al. A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm , 2019, ACISP.
[13] Alexander Carballo,et al. A Survey of Autonomous Driving: Common Practices and Emerging Technologies , 2019, IEEE Access.
[14] Yuan Tian,et al. Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries , 2020, USENIX Security Symposium.
[15] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[16] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[17] Michael I. Jordan,et al. HopSkipJumpAttack: A Query-Efficient Decision-Based Attack , 2019, 2020 IEEE Symposium on Security and Privacy (SP).