Synthesizing Robust Adversarial Examples

作者: Anish Athalye , Logan Engstrom , Andrew Ilyas , Kevin Kwok

DOI:

关键词:

摘要: … We introduce a new algorithm for synthesizing adversarial examples that are robust … synthesize robust adversarial examples, we use the EOT framework for generating 2D examples…

参考文章(33)
Nedim Šrndić, Battista Biggio, Giorgio Giacinto, Igino Corona, Fabio Roli, Davide Maiorca, Blaine Nelson, Pavel Laskov, Evasion attacks against machine learning at test time european conference on machine learning. ,vol. 8190, pp. 387- 402 ,(2013) , 10.1007/978-3-642-40994-3_25
Joan Bruna, Christian Szegedy, Ilya Sutskever, Ian Goodfellow, Wojciech Zaremba, Rob Fergus, Dumitru Erhan, None, Intriguing properties of neural networks arXiv: Computer Vision and Pattern Recognition. ,(2013)
K. McLAREN, XIII—The Development of the CIE 1976 (L* a* b*) Uniform Colour Space and Colour‐difference Formula Journal of The Society of Dyers and Colourists. ,vol. 92, pp. 338- 341 ,(2008) , 10.1111/J.1478-4408.1976.TB03301.X
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami, The Limitations of Deep Learning in Adversarial Settings ieee european symposium on security and privacy. pp. 372- 387 ,(2016) , 10.1109/EUROSP.2016.36
Tomaso A. Poggio, Gemma Roig, Yan Luo, Xavier Boix, Qi Zhao, Foveation-based Mechanisms Alleviate Adversarial Examples arXiv: Learning. ,(2016)
Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Pascal Frossard, DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks computer vision and pattern recognition. pp. 2574- 2582 ,(2016) , 10.1109/CVPR.2016.282
Ian Goodfellow, Samy Bengio, Alexey Kurakin, Adversarial examples in the physical world arXiv: Computer Vision and Pattern Recognition. ,(2016)
Nicholas Carlini, Micah Sherr, David Wagner, Tavish Vaidya, Clay Shields, Pratyush Mishra, Yuankai Zhang, Wenchao Zhou, Hidden voice commands usenix security symposium. pp. 513- 530 ,(2016)
Nicholas Carlini, David A. Wagner, Defensive Distillation is Not Robust to Adversarial Examples arXiv: Cryptography and Security. ,(2016)
Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter, Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition computer and communications security. pp. 1528- 1540 ,(2016) , 10.1145/2976749.2978392