1 code implementation • 7 Aug 2022 • Zikui Cai, Chengyu Song, Srikanth Krishnamurthy, Amit Roy-Chowdhury, M. Salman Asif
We also show that the perturbations generated by our proposed method are highly transferable and can be adopted for hard-label blackbox attacks.
no code implementations • ECCV 2020 • Shasha Li, Shitong Zhu, Sudipta Paul, Amit Roy-Chowdhury, Chengyu Song, Srikanth Krishnamurthy, Ananthram Swami, Kevin S. Chan
There has been a recent surge in research on adversarial perturbations that defeat Deep Neural Networks (DNNs) in machine vision; most of these perturbation-based attacks target object classifiers.