DTA: distribution transform-based attack for query-limited scenario
Abstract In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually results in thousands of trials during an attack. This may be unacceptable in real app...
Main Authors: | Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, Ruxin Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2024-04-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | https://doi.org/10.1186/s42400-023-00197-2 |
Similar Items
-
DTA: distribution transform-based attack for query-limited scenario
by: Liu, Renyang, et al.
Published: (2024) -
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
by: Renyang Liu, et al.
Published: (2023-02-01) -
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
by: Haoran Lyu, et al.
Published: (2024-03-01) -
A Hybrid Adversarial Attack for Different Application Scenarios
by: Xiaohu Du, et al.
Published: (2020-05-01) -
Enhancing the Transferability of Targeted Attacks with Adversarial Perturbation Transform
by: Zhengjie Deng, et al.
Published: (2023-09-01)