2021
DOI: 10.1007/978-3-030-72699-7_35
|View full text |Cite
|
Sign up to set email alerts
|

Effective Universal Unrestricted Adversarial Attacks Using a MOE Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…We propose a nested-evolutionary algorithm for generating universal unrestricted adversarial examples in a black-box scenario inspired by [13]. Given a sequence of image filters as input, the algorithm returns the best image-agnostic filter configuration which, applied to the images from the dataset, maximizes the classification error of the target model while the detection rate and the perturbation applied are minimized.…”
Section: Approach and Algorithmmentioning
confidence: 99%
“…We propose a nested-evolutionary algorithm for generating universal unrestricted adversarial examples in a black-box scenario inspired by [13]. Given a sequence of image filters as input, the algorithm returns the best image-agnostic filter configuration which, applied to the images from the dataset, maximizes the classification error of the target model while the detection rate and the perturbation applied are minimized.…”
Section: Approach and Algorithmmentioning
confidence: 99%
“…The diffusion and the wide use of deep learning methods for artificial intelligence systems, thus, pose significant security and privacy issues. From the security point of view, Adversarial Attacks (AA) showed that deep learning models can be easily fooled [ 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 ] while, from a privacy point of view, it has been shown that information can be easily extracted from dataset and learned model [ 26 , 27 , 28 ]. It has also been shown that attacking methods based on adversarial samples can be used for privacy-preserving purposes [ 29 , 30 , 31 , 32 , 33 ]: in this case, data are intentionally modified to avoid unauthorized information extraction by fooling the unauthorized software.…”
Section: Introductionmentioning
confidence: 99%
“…The fooling protecting filters are built by composing and parametrizing popular image-enhancing Instagram filters: they are the result of an optimization process implemented by a nested-evolutionary algorithm [ 13 , 14 , 33 ]. Applying these protecting filters to any image, we obtain a series of other images from which information extraction is more difficult.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations