An Optimized Algorithm for Speeding up Universal Adversarial Perturbation Generation
Abstract
References
Index Terms
- An Optimized Algorithm for Speeding up Universal Adversarial Perturbation Generation
Recommendations
Universal adversarial perturbations generative network
AbstractRecently, adversarial attack against Deep Neural Networks (DNN) have drawn very keen interest of researchers. Existence of universal adversarial perturbations could empower the cases where could not generate the image-dependent adversarial ...
Unsupervised Adversarial Perturbation Eliminating via Disentangled Representations
CACRE2019: Proceedings of the 2019 4th International Conference on Automation, Control and Robotics EngineeringAlthough deep neural networks (DNNs) could achieve state-of-the-art performance while recognizing images, they often vulnerable to adversarial examples where input intended to be added the small magnitude perturbations may mislead them to incorrect ...
Fake Faces Identification via Convolutional Neural Network
IH&MMSec '18: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia SecurityGenerative Adversarial Network (GAN) is a prominent generative model that are widely used in various applications. Recent studies have indicated that it is possible to obtain fake face images with a high visual quality based on this novel model. If ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/c43765d3-2385-4f26-9e87-3f9de8f83226/3436369.cover.jpg)
In-Cooperation
- Beijing University of Technology
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 33Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in