Overview
Syllabus
Intro
Adversarial attack (Szegedy et. al. 2013)
Motivation
Motion picture content rating system
Notations
Types of adversarial attacks
Attack objectives
Existing work
Implicit representations of boundary (Part 1)
An Iterative Algorithm
Convergence
Black-box setting: Access to decisions alone
Boundary search requires labels alone
A decision-based gradient direction estimate
Intuition of proof
A visualization of our algorithm
Binary Search: Find boundary of dog & nondog
Gradient direction estimation
Appropriate size of random perturbation
An uneven distribution of signs
Variance reduction
Distance vs. # Queries
Visualization on ImageNet
Defense mechanisms under HopSkipJumpAttack
Taught by
IEEE Symposium on Security and Privacy