DTA: distribution transform-based attack for query-limited scenario

In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually results in thousands of trials during an attack. This may be unacceptable in real applications...

Full description

Bibliographic Details
Main Authors: Liu, Renyang, Zhou, Wei, Jin, Xin, Gao, Song, Wang, Yuanyu, Wang, Ruxin
Other Authors: School of Computer Science and Engineering
Format: Journal Article
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/179697

Similar Items