Deep neural networks are vulnerable to adversarial examples, posing a threat to the models' applications and raising security concerns. An intriguing property of adversarial examples is their strong transferability. Several methods have been proposed to enhance transferability, including ensemble attacks which have demonstrated their efficacy. However, prior approaches simply average logits, probabilities, or losses for model ensembling, lacking a comprehensive analysis of how and why model ensembling significantly improves transferability. In this paper, we propose a similar targeted attack method named Similar Target~(ST). By promoting cosine similarity between the gradients of each model, our method regularizes the optimization direction...
Convolutional neural networks have outperformed humans in image recognition tasks, but they remain v...
In adversarial examples, humans can easily classify the images even though the images are corrupted...
Transfer-based adversarial example is one of the most important classes of black-box attacks. Howeve...
Deep Neural Networks have been found vulnerable re-cently. A kind of well-designed inputs, which cal...
peer reviewedAn established way to improve the transferability of black-box evasion attacks is to cr...
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad attention i...
Adversarial examples consist of minor perturbations added to a model\u27s input which cause the mode...
Adversarial examples (AEs) for DNNs have been shown to be transferable: AEs that successfully fool w...
Despite state-of-the-art performance on natural data, Deep Neural Networks (DNNs) are highly vulnera...
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial examples, there is...
Deep neural networks are vulnerable to adversarial examples, which attach human invisible perturbati...
Transfer-based adversarial attacks can evaluate model robustness in the black-box setting. Several m...
Adversarial attacks provide a good way to study the robustness of deep learning models. One category...
The adversarial vulnerability of deep neural networks (DNNs) has drawn great attention due to the se...
Existing transfer attack methods commonly assume that the attacker knows the training set (e.g., the...
Convolutional neural networks have outperformed humans in image recognition tasks, but they remain v...
In adversarial examples, humans can easily classify the images even though the images are corrupted...
Transfer-based adversarial example is one of the most important classes of black-box attacks. Howeve...
Deep Neural Networks have been found vulnerable re-cently. A kind of well-designed inputs, which cal...
peer reviewedAn established way to improve the transferability of black-box evasion attacks is to cr...
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad attention i...
Adversarial examples consist of minor perturbations added to a model\u27s input which cause the mode...
Adversarial examples (AEs) for DNNs have been shown to be transferable: AEs that successfully fool w...
Despite state-of-the-art performance on natural data, Deep Neural Networks (DNNs) are highly vulnera...
Given the severe vulnerability of Deep Neural Networks (DNNs) against adversarial examples, there is...
Deep neural networks are vulnerable to adversarial examples, which attach human invisible perturbati...
Transfer-based adversarial attacks can evaluate model robustness in the black-box setting. Several m...
Adversarial attacks provide a good way to study the robustness of deep learning models. One category...
The adversarial vulnerability of deep neural networks (DNNs) has drawn great attention due to the se...
Existing transfer attack methods commonly assume that the attacker knows the training set (e.g., the...
Convolutional neural networks have outperformed humans in image recognition tasks, but they remain v...
In adversarial examples, humans can easily classify the images even though the images are corrupted...
Transfer-based adversarial example is one of the most important classes of black-box attacks. Howeve...