2020
DOI: 10.48550/arxiv.2012.05434
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Composite Adversarial Attacks

Abstract: Adversarial attack is a technique for deceiving Machine Learning (ML) models, which provides a way to evaluate the adversarial robustness. In practice, attack algorithms are artificially selected and tuned by human experts to break a ML system. However, manual selection of attackers tends to be sub-optimal, leading to a mistakenly assessment of model security. In this paper, a new procedure called Composite Adversarial Attack (CAA) is proposed for automatically searching the best combination of attack algorith… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Laidlaw and Feizi (Laidlaw & Feizi, 2019) propose the ReColorAdv attack, which admit multi-functional threats to be used for perturbing every input pixel and also combine with additional p -norm threat. Instead of changing input by adding perturbation functionally, (Mao et al, 2020) rather utilizes genetic algorithms for searching the best combination in multiple attacks that are stronger than single attack. However, they only consider searching the order of attack combination in particular norm space (i.e., 2 , ∞ and corruption semantic space), which is different from our multiple and sequential attack setting.…”
Section: Composite Adversarial Perturbationsmentioning
confidence: 99%
“…Laidlaw and Feizi (Laidlaw & Feizi, 2019) propose the ReColorAdv attack, which admit multi-functional threats to be used for perturbing every input pixel and also combine with additional p -norm threat. Instead of changing input by adding perturbation functionally, (Mao et al, 2020) rather utilizes genetic algorithms for searching the best combination in multiple attacks that are stronger than single attack. However, they only consider searching the order of attack combination in particular norm space (i.e., 2 , ∞ and corruption semantic space), which is different from our multiple and sequential attack setting.…”
Section: Composite Adversarial Perturbationsmentioning
confidence: 99%