DIVERSE GENERATIVE PERTURBATIONS ON ATTENTION SPACE FOR TRANSFERABLE ADVERSARIAL ATTACKS

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 59
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Woo Jaeko
dc.contributor.authorHong, Seunghoonko
dc.contributor.authorYoon, Sung-Euiko
dc.date.accessioned2023-09-01T01:01:59Z-
dc.date.available2023-09-01T01:01:59Z-
dc.date.created2023-02-09-
dc.date.created2023-02-09-
dc.date.created2023-02-09-
dc.date.issued2022-10-
dc.identifier.citation29th IEEE International Conference on Image Processing, ICIP 2022, pp.281 - 285-
dc.identifier.issn1522-4880-
dc.identifier.urihttp://hdl.handle.net/10203/312093-
dc.description.abstractAdversarial attacks with improved transferability - the ability of an adversarial example crafted on a known model to also fool unknown models - have recently received much attention due to their practicality. Nevertheless, existing transferable attacks craft perturbations in a deterministic manner and often fail to fully explore the loss surface, thus falling into a poor local optimum and suffering from low transferability. To solve this problem, we propose Attentive-Diversity Attack (ADA), which disrupts diverse salient features in a stochastic manner to improve transferability. Primarily, we perturb the image attention to disrupt universal features shared by different models. Then, to effectively avoid poor local optima, we disrupt these features in a stochastic manner and explore the search space of transferable perturbations more exhaustively. More specifically, we use a generator to produce adversarial perturbations that each disturbs features in different ways depending on an input latent code. Extensive experimental evaluations demonstrate the effectiveness of our method, outperforming the transferability of state-of-the-art methods. Codes are available at https://github.com/wkim97/ADA.-
dc.languageEnglish-
dc.publisherIEEE Computer Society-
dc.titleDIVERSE GENERATIVE PERTURBATIONS ON ATTENTION SPACE FOR TRANSFERABLE ADVERSARIAL ATTACKS-
dc.typeConference-
dc.identifier.scopusid2-s2.0-85146649555-
dc.type.rimsCONF-
dc.citation.beginningpage281-
dc.citation.endingpage285-
dc.citation.publicationname29th IEEE International Conference on Image Processing, ICIP 2022-
dc.identifier.conferencecountryFR-
dc.identifier.conferencelocationBordeaux-
dc.identifier.doi10.1109/ICIP46576.2022.9897346-
dc.contributor.localauthorHong, Seunghoon-
dc.contributor.localauthorYoon, Sung-Eui-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0