DTA: distribution transform-based attack for query-limited scenario

Abstract In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually results in thousands of trials during an attack. This may be unacceptable in real app...

Full description

Bibliographic Details
Main Authors: Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, Ruxin Wang
Format: Article
Language:English
Published: SpringerOpen 2024-04-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-023-00197-2

Similar Items