2022
DOI: 10.1145/3511893
|View full text |Cite
|
Sign up to set email alerts
|

EGM: An Efficient Generative Model for Unrestricted Adversarial Examples

Abstract: Unrestricted adversarial examples allow the attacker to start attacks without given clean samples, which are quite aggressive and threatening. However, existing works for generating unrestricted adversary examples are quite inefficient and cannot achieve a high success rate. In this paper, we explore an end-to-end and effective solution for unrestricted adversary example generation. To stabilize the training process and make our generative model converge to satisfactory results, we design a novel decoupled two… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…To ensure the efficiency of generating attacks, generative model-based attack methods (Hayes and Danezis 2017;Poursaeed et al 2017;Liu et al 2019;Xiang et al 2022;Qiu et al 2019;Salzmann et al 2021;Aich et al 2022) have been extensively studied. For example, Aishan et al (Hayes and Danezis 2017) train a generative network capable of generating universal perturbations to fool a target classifier.…”
Section: Related Work Adversarial Attackmentioning
confidence: 99%
“…To ensure the efficiency of generating attacks, generative model-based attack methods (Hayes and Danezis 2017;Poursaeed et al 2017;Liu et al 2019;Xiang et al 2022;Qiu et al 2019;Salzmann et al 2021;Aich et al 2022) have been extensively studied. For example, Aishan et al (Hayes and Danezis 2017) train a generative network capable of generating universal perturbations to fool a target classifier.…”
Section: Related Work Adversarial Attackmentioning
confidence: 99%
“…Tao et al[55] also propose a method for generating unrestricted examples, referred to as EGM. As opposed to[60,16], it decouples the realistic image generation step from manipulating the artificial image into an adversarial example, thus having two components G and T in the adversarial attack generation pipeline.…”
mentioning
confidence: 99%