August 2019
Intermediate to advanced
342 pages
9h 35m
English
As we said previously, the model-substitution-based adversarial attack methodology is aimed at training a substitute model that resembles the original target NN in order to find viable vulnerabilities on the target NN.
The training phase of the substitute model is therefore characterized by a number of important peculiarities, which involves the following:
In order to address these difficult tasks, the proposed attack strategy is based on the generation of synthetic data (using the technique known as Jacobian-based ...
Read now
Unlock full access