Overview
Explore a 16-minute IEEE conference talk on developing universal 3-dimensional perturbations for black-box attacks on video recognition systems. Delve into adversarial tags, previous video attacks, and the proposed threat model. Learn about the innovative ProcedureNoise framework, techniques for improving processor abilities, and methods to address boundary effects. Examine expandable results, family models, and adverse examples. Gain insights into real-time performance and attacks against main differences in video recognition systems.
Syllabus
Introduction
Adversarial Tags
Video Recognition Systems
Previous Video Attacks
Contributions
Threat Model
Procedure Noise
Tech Framework
Improving Processor Abilities
Addressing the Boundary Effect
Expandable Results
Family Models
Adverse Examples
RealTime Performance
Attack against the main difference
Conclusion
Taught by
IEEE Symposium on Security and Privacy