Javascript must be enabled to continue!
Adversarial sample attack method based on loss smoothing
View through CrossRef
Deep neural networks (DNNs) are vulnerable to adversarial examples.Although the existing momentum-based adversarial example generation method can achieve a close 100%white-box attack success rate, it is still not ideal when attacking other models, and the black- box attack success rate is low. To address this, an adversarial example attack method based on loss smoothing is proposed to improve the transferability of adversarial examples. In the iterative process of calculating the gradient at each step, the current gradient is not used directly, but the local average gradient is used to accumulate momentum, so as to suppress the local oscillation phenomenon on the loss function surface, thereby stabilizing the update direction and escaping the local extreme point. A large number of experimental results on the ImageNet dataset show that compared with the existing momentum-based method, the average black-box attack success rate of the proposed method in single model attack experiments is improved by 38.07%and 27.77%, and the average black-box attack success rate in integrated model attack experiments is improved by and.Rising32.50%and28.63%
Title: Adversarial sample attack method based on loss smoothing
Description:
Deep neural networks (DNNs) are vulnerable to adversarial examples.
Although the existing momentum-based adversarial example generation method can achieve a close 100%white-box attack success rate, it is still not ideal when attacking other models, and the black- box attack success rate is low.
To address this, an adversarial example attack method based on loss smoothing is proposed to improve the transferability of adversarial examples.
In the iterative process of calculating the gradient at each step, the current gradient is not used directly, but the local average gradient is used to accumulate momentum, so as to suppress the local oscillation phenomenon on the loss function surface, thereby stabilizing the update direction and escaping the local extreme point.
A large number of experimental results on the ImageNet dataset show that compared with the existing momentum-based method, the average black-box attack success rate of the proposed method in single model attack experiments is improved by 38.
07%and 27.
77%, and the average black-box attack success rate in integrated model attack experiments is improved by and.
Rising32.
50%and28.
63%.
Related Results
PENGARUH RASIO KEUANGAN TERHADAP PRAKTIK PERATAAN LABA (INCOME SMOOTHING) DENGAN KUALITAS AUDIT SEBAGAI VARIABLE MODERASI PADA PERUSAHAAN SUB SEKTOR PERBANKAN YANG TERDAFTAR DI BURSA EFEK INDDONESIA 2020-2021
PENGARUH RASIO KEUANGAN TERHADAP PRAKTIK PERATAAN LABA (INCOME SMOOTHING) DENGAN KUALITAS AUDIT SEBAGAI VARIABLE MODERASI PADA PERUSAHAAN SUB SEKTOR PERBANKAN YANG TERDAFTAR DI BURSA EFEK INDDONESIA 2020-2021
ABSTRAK
Tujuan penelitian ini adalah untuk menguji secara empiris mengenai pengaruh rasio keuangan terhadap praktik peartaan laba (income smoothing) dengan kualitas audit sebagai ...
ProDef-MDS: A Proactive Defense Mechanism Protecting Malware Detection Systems from Adversarial Attacks
ProDef-MDS: A Proactive Defense Mechanism Protecting Malware Detection Systems from Adversarial Attacks
Malware threatens cybersecurity by enabling data theft, unauthorized access, and extortion. Traditional malware detection systems (MDS) struggle with the increasing volume and comp...
Mitigating Adversarial Attacks Uncertainty Through Interval Analysis
Mitigating Adversarial Attacks Uncertainty Through Interval Analysis
Abstract
The adversarial attack is characterized by a high attack success rate and a fast generation of examples. It is widely used in neural network robustness eva...
Adversarial examples attack based on random warm restart mechanism and improved Nesterov momentum
Adversarial examples attack based on random warm restart mechanism and improved Nesterov momentum
The deep learning algorithm has achieved great success in the field of computer vision, but some studies have pointed out that the deep learning model is vulnerable to attacks adve...
Adversarial examples attack based on random warm restart mechanism and improved Nesterov momentum
Adversarial examples attack based on random warm restart mechanism and improved Nesterov momentum
The deep learning algorithm has achieved great success in the field of
computer vision, but some studies have pointed out that the deep
learning model is vulnerable to attacks adve...
Red-Teaming Medical AI: Systematic Adversarial Evaluation of LLM Safety Guardrails in Clinical Contexts
Red-Teaming Medical AI: Systematic Adversarial Evaluation of LLM Safety Guardrails in Clinical Contexts
Abstract
Background
Large language models (LLMs) are increasingly deployed in medical contexts as patient-facing assistants, pr...
Efficient Defense Against First Order Adversarial Attacks on Convolutional Neural Networks
Efficient Defense Against First Order Adversarial Attacks on Convolutional Neural Networks
Machine learning models, especially neural networks, are vulnerable to adversarial attacks, where inputs are purposefully altered to induce incorrect predictions. These adversarial...
Improving Diversity and Quality of Adversarial Examples in Adversarial Transformation Network
Improving Diversity and Quality of Adversarial Examples in Adversarial Transformation Network
Abstract
This paper proposes a method to mitigate two major issues of Adversarial Transformation Networks (ATN) including the low diversity and the low quality of adversari...

