2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019
DOI: 10.1109/cvpr.2019.00723
|View full text |Cite
|
Sign up to set email alerts
|

Feature Space Perturbations Yield More Transferable Adversarial Examples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
88
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 148 publications
(88 citation statements)
references
References 8 publications
0
88
0
Order By: Relevance
“…This is mainly achieved by reducing the dispersion in the feature maps of the internal layers of the surrogate model with the help of a specialized loss. Inkawhich et al [111] also claimed that feature space perturbations are particularly helpful in computing adversarial examples that are more transferable across models.…”
Section: B Black-box Attacksmentioning
confidence: 99%
“…This is mainly achieved by reducing the dispersion in the feature maps of the internal layers of the surrogate model with the help of a specialized loss. Inkawhich et al [111] also claimed that feature space perturbations are particularly helpful in computing adversarial examples that are more transferable across models.…”
Section: B Black-box Attacksmentioning
confidence: 99%
“…Both gradient ascent and descent are combined for more diversity [35]. Another thread of works focus on the feature level to improve transferability [45,23]. The intuition is to induce a similar intermediate feature via perturbing image pixels, by assuming that different models generate identical feature-level representations.…”
Section: Black-box Adversarial Attacksmentioning
confidence: 99%
“…The intuition is to induce a similar intermediate feature via perturbing image pixels, by assuming that different models generate identical feature-level representations. Intermediate loss is introduced to optimize l 2 norm between feature maps from all layers in [45,23]. Our work taps into this line to enhance black-box transferability for image retrieval systems and will compare with these techniques in Sec.…”
Section: Black-box Adversarial Attacksmentioning
confidence: 99%
“…Alternatively transfer-based approaches rely on similar models being susceptible to the same adversarial samples [10]. Recent studies [11,12,13] have demonstrated successful transfer of attacks, but only in situations where the networks are extremely similar in structure and parameters.…”
Section: Introductionmentioning
confidence: 99%