Abstract:
Deep Neural Networks (DNN) are very effective in high performance applications such as computer vision, natural language processing and speech recognition. However, these...Show MoreMetadata
Abstract:
Deep Neural Networks (DNN) are very effective in high performance applications such as computer vision, natural language processing and speech recognition. However, these networks are vulnerable to adversarial attacks that infuses perturbations in the input data which are imperceptible to human eyes. In this paper, we propose a novel decision-based targeted adversarial attack algorithm which exposes the vulnerability of the underlying DNN when implemented on a resource constrained computing edge. Experimental results show that the proposed model performs 4 seconds(s) faster on an average, in a single perturbed image generation than the state of the art RED-attack, while consuming 15% less time for the entire dataset.
Published in: 2020 IEEE Workshop on Signal Processing Systems (SiPS)
Date of Conference: 20-22 October 2020
Date Added to IEEE Xplore: 23 September 2020
Print ISBN:978-1-7281-8099-1
Print ISSN: 2374-7390
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Deep Neural Network ,
- Speech Recognition ,
- Imperceptible ,
- Time Dataset ,
- Adversarial Attacks ,
- High-performance Applications ,
- Hyperparameters ,
- Input Image ,
- Single Image ,
- Class Labels ,
- Target Image ,
- Target Class ,
- Source Images ,
- Types Of Attacks ,
- Security Vulnerabilities ,
- Structural Similarity Index ,
- Random Images ,
- Optimization-based Methods ,
- Kinds Of Attacks ,
- Black-box Attacks ,
- Binary Search Algorithm ,
- Desktop Machine ,
- Single Query ,
- Average CPU Time ,
- Attack Performance
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Deep Neural Network ,
- Speech Recognition ,
- Imperceptible ,
- Time Dataset ,
- Adversarial Attacks ,
- High-performance Applications ,
- Hyperparameters ,
- Input Image ,
- Single Image ,
- Class Labels ,
- Target Image ,
- Target Class ,
- Source Images ,
- Types Of Attacks ,
- Security Vulnerabilities ,
- Structural Similarity Index ,
- Random Images ,
- Optimization-based Methods ,
- Kinds Of Attacks ,
- Black-box Attacks ,
- Binary Search Algorithm ,
- Desktop Machine ,
- Single Query ,
- Average CPU Time ,
- Attack Performance