2020
DOI: 10.1007/978-3-030-58592-1_29
|View full text |Cite
|
Sign up to set email alerts
|

Square Attack: A Query-Efficient Black-Box Adversarial Attack via Random Search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
345
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 446 publications
(391 citation statements)
references
References 25 publications
0
345
1
Order By: Relevance
“…In this section, we compare algorithms based on a selection of state-of-the-art DFO methods. In particular we consider an improved version of the BOBYQA based algorithm (Ughi et al 2019), GenAttack algorithm (Alzantot et al 2019), Parsimonious algorithm (Moon et al 2019), Square algorithm (Andriushchenko et al 2020) and Frank-Wolfe algorithm (Chen et al 2020) in the following two frameworks: -Section 4.3 considers the canonical setup for black-box adversarial attacks on which the considered algorithms have been tuned in their respective articles. Specifically, we consider attacks on networks trained adversarially or not on CIFAR10 and ImageNet, two popular datasets in the literature, and with no further defense implemented.…”
Section: Comparison Of Derivative Free Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…In this section, we compare algorithms based on a selection of state-of-the-art DFO methods. In particular we consider an improved version of the BOBYQA based algorithm (Ughi et al 2019), GenAttack algorithm (Alzantot et al 2019), Parsimonious algorithm (Moon et al 2019), Square algorithm (Andriushchenko et al 2020) and Frank-Wolfe algorithm (Chen et al 2020) in the following two frameworks: -Section 4.3 considers the canonical setup for black-box adversarial attacks on which the considered algorithms have been tuned in their respective articles. Specifically, we consider attacks on networks trained adversarially or not on CIFAR10 and ImageNet, two popular datasets in the literature, and with no further defense implemented.…”
Section: Comparison Of Derivative Free Methodsmentioning
confidence: 99%
“…It was demonstrated in Chen et al (2017) that these algorithms are especially effective when numerous adversarial examples are computed, but become less efficient when an individual adversarial examples is considered. Following the introduction of ZOO, there have been numerous improvements using other model-free DFO based approaches, see for example (Al-Dujaili and O'Reilly 2020; Alzantot et al 2019;Andriushchenko et al 2020;Chen et al 2020;Ilyas et al 2018Ilyas et al , 2019Moon et al 2019). Many of these algorithms were developed in parallel, and so have not yet been bench-marked in a consistent setting, e.g.…”
Section: Adversarial Specificitymentioning
confidence: 99%
See 2 more Smart Citations
“…For transfer-based attack, we generate adversarial example by applying PGD/CW attacks on an adversarial trained WideResNet34-10. For query-based attack, we adopt a representative attack: SQUARE, which outperforms other blackbox attacks and is comparable with white-box attacks[24]. As shown in Table3, we can observe significant improvements as claimed in white-box scenario.…”
mentioning
confidence: 91%