2018
DOI: 10.48550/arxiv.1808.01153
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Ask, Acquire, and Attack: Data-free UAP Generation using Class Impressions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The norm loss L n is the same as (22), so the total loss L t of the targeted attack can be derived as follows: All the experiments were performed under standard operating conditions (SOC), which included ten ground target classes, such as self-propelled howitzers (2S1); infantry fighting vehicles (BMP2); armored reconnaissance vehicles (BRDM2); wheeled armored transport vehicles (BTR60, BTR70); bulldozers (D7); main battle tanks (T62, T72); cargo trucks (ZIL131); and self-propelled artillery (ZSU234). The training dataset contains 2747 images collected at a 17 • depression angle, and the testing dataset contains 2426 images captured at a 15 • depression angle.…”
Section: Design Of Loss Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The norm loss L n is the same as (22), so the total loss L t of the targeted attack can be derived as follows: All the experiments were performed under standard operating conditions (SOC), which included ten ground target classes, such as self-propelled howitzers (2S1); infantry fighting vehicles (BMP2); armored reconnaissance vehicles (BRDM2); wheeled armored transport vehicles (BTR60, BTR70); bulldozers (D7); main battle tanks (T62, T72); cargo trucks (ZIL131); and self-propelled artillery (ZSU234). The training dataset contains 2747 images collected at a 17 • depression angle, and the testing dataset contains 2426 images captured at a 15 • depression angle.…”
Section: Design Of Loss Functionsmentioning
confidence: 99%
“…Mopuri et al [21] argue that it is difficult for attackers to obtain the training dataset of the victim model, so to reduce the dependence on the dataset, they proposed a data-free method to generate UAPs by destroying the features extracted by convolutional layers. Another data-free work [22] used class impressions to simulate a real data distribution, generating UAPs with high transferability. In the field of remote sensing, Xu et al [23] were the first to investigate the adversarial attack and defense in safety-critical remote sensing tasks.…”
Section: Introductionmentioning
confidence: 99%
“…The norm loss L n is the same as (22), so the total loss L t of the targeted attack can be derived as follows: angle. More details about the dataset are shown in Table 2, and Figure 6 shows the optical images and corresponding SAR images of ten ground target classes.…”
Section: Design Of Loss Functionsmentioning
confidence: 99%
“…Mopuri et al [21] argue that it is difficult for attackers to obtain the training dataset of the victim model, so to reduce the dependence on the dataset, they propose a data-free method to generate UAPs by destroying the features extracted by convolutional layers. Another data-free work [22] uses class impressions to simulate real data distribution, generating UAPs with high transferability. In the field of remote sensing, Xu et al [23] are the first to investigate the adversarial attack and defense in safety-critical remote sensing tasks.…”
Section: Introductionmentioning
confidence: 99%