HopSkipJumpAttack - A Query-Efficient Decision-Based Attack

HopSkipJumpAttack - A Query-Efficient Decision-Based Attack

IEEE Symposium on Security and Privacy via YouTube Direct link

Defense mechanisms under HopSkipJumpAttack

24 of 24

24 of 24

Defense mechanisms under HopSkipJumpAttack

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

HopSkipJumpAttack - A Query-Efficient Decision-Based Attack

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Adversarial attack (Szegedy et. al. 2013)
  3. 3 Motivation
  4. 4 Motion picture content rating system
  5. 5 Notations
  6. 6 Types of adversarial attacks
  7. 7 Attack objectives
  8. 8 Existing work
  9. 9 Implicit representations of boundary (Part 1)
  10. 10 An Iterative Algorithm
  11. 11 Convergence
  12. 12 Black-box setting: Access to decisions alone
  13. 13 Boundary search requires labels alone
  14. 14 A decision-based gradient direction estimate
  15. 15 Intuition of proof
  16. 16 A visualization of our algorithm
  17. 17 Binary Search: Find boundary of dog & nondog
  18. 18 Gradient direction estimation
  19. 19 Appropriate size of random perturbation
  20. 20 An uneven distribution of signs
  21. 21 Variance reduction
  22. 22 Distance vs. # Queries
  23. 23 Visualization on ImageNet
  24. 24 Defense mechanisms under HopSkipJumpAttack

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.