Trust Region Based Adversarial Attack on Neural Networks

Trust Region Based Adversarial Attack on Neural Networks

UCF CRCV via YouTube Direct link

Introduction

1 of 28

1 of 28

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Trust Region Based Adversarial Attack on Neural Networks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 3D adversarial objects
  3. 3 Physical attacks on traffic signs
  4. 4 Adversarial Patches to Attack Person Detection
  5. 5 Semantic Segmentation and Object Detection
  6. 6 LIDAR attack
  7. 7 Definitions
  8. 8 Problem Formulation
  9. 9 Fast Gradient Sign Method • Goodfellow et al. proposed the Fast Gradient Sign Method FGSM
  10. 10 Basic Iterative Method
  11. 11 Carlini-Wagner Attack
  12. 12 Problems and Challenges
  13. 13 Other Problems
  14. 14 Contributions
  15. 15 Trust Region Optimization
  16. 16 Updating the Trust Region
  17. 17 Trust region example - Initial Start
  18. 18 Iteration 1
  19. 19 Final Trajectory after 20 iterations
  20. 20 Proposed Method
  21. 21 Metrics
  22. 22 Types of attacks used
  23. 23 Summary of setup
  24. 24 Time Performance on ImageNet
  25. 25 Qualitative Results
  26. 26 ImageNet Results
  27. 27 Second order attack results
  28. 28 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.