DTA: distribution transform-based attack for query-limited scenario
Abstract In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually results in thousands of trials during an attack. This may be unacceptable in real app...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2024-04-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | https://doi.org/10.1186/s42400-023-00197-2 |