Adversarial attack via dual-stage network erosion

نویسندگان

چکیده

Deep neural networks are vulnerable to adversarial examples, which can fool deep models by adding subtle perturbations. Although existing attacks have achieved promising results, it still leaves a long way go for generating transferable examples under the black-box setting. To this end, paper proposes improve transferability of and applies dual-stage feature-level perturbations an model implicitly create set diverse models. Then these fused longitudinal ensemble during iterations. The proposed method is termed Dual-Stage Network Erosion (DSNE). We conduct comprehensive experiments both on non-residual residual networks, obtain more with computational cost similar state-of-the-art method. In particular, be significantly improved biasing block information skip connections. Our work provides new insights into architectural vulnerability presents challenges robustness networks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SVSGAN: Singing Voice Separation via Generative Adversarial Network

Separating two sources from an audio mixture is an important task with many applications. It is a challenging problem since only one signal channel is available for analysis. In this paper, we propose a novel framework for singing voice separation using the generative adversarial network (GAN) with a time-frequency masking function. The mixture spectra is considered to be a distribution and is ...

متن کامل

Learning to Attack: Adversarial Transformation Networks

With the rapidly increasing popularity of deep neural networks for image recognition tasks, a parallel interest in generating adversarial examples to attack the trained models has arisen. To date, these approaches have involved either directly computing gradients with respect to the image pixels or directly solving an optimization on the image pixels. We generalize this pursuit in a novel direc...

متن کامل

Measuring the efficiency of a three-stage network using data envelopment analysis approach considering dual boundary

This paper presents a method for performance evaluation, ranking and clustering based on the double-frontier view to analyze the complex networks. The model allows us to open the structure of the “black box” and can help to obtain important information about efficient and inefficient points of the system. In this paper, we consider a three-stage network, in respect to the additional desirable a...

متن کامل

Dual Discriminator Generative Adversarial Nets

We propose in this paper a novel approach to tackle the problem of mode collapse encountered in generative adversarial network (GAN). Our idea is intuitive but proven to be very effective, especially in addressing some key limitations of GAN. In essence, it combines the Kullback-Leibler (KL) and reverse KL divergences into a unified objective function, thus it exploits the complementary statist...

متن کامل

Dual Z-Source Network Dual-Input Dual-Output Inverter

This paper presents a modified nine switch inverter with two inputs and two Z-source networks. This inverter has two DC inputs and two AC outputs. Input DC voltages can be boosted to the required level. Amplitude, frequency and phase of AC output voltages can be controlled, independently. The proposed converter can be used in applications with two unregulated DC sources, which require feeding ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2022

ISSN: ['0167-4048', '1872-6208']

DOI: https://doi.org/10.1016/j.cose.2022.102888