DTA: distribution transform-based attack for query-limited scenario
In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually results in thousands of trials during an attack. This may be unacceptable in real applications...
Main Authors: | Liu, Renyang, Zhou, Wei, Jin, Xin, Gao, Song, Wang, Yuanyu, Wang, Ruxin |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Journal Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/179697 |
Similar Items
-
DTA: distribution transform-based attack for query-limited scenario
by: Renyang Liu, et al.
Published: (2024-04-01) -
Towards the universal defense for query-based audio adversarial attacks on speech recognition system
by: Feng Guo, et al.
Published: (2023-08-01) -
Black-Box Based Limited Query Membership Inference Attack
by: Yu Zhang, et al.
Published: (2022-01-01) -
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
by: Renyang Liu, et al.
Published: (2023-02-01) -
Textual Adversarial Attacking with Limited Queries
by: Yu Zhang, et al.
Published: (2021-10-01)