{"title":"决策边界中对抗性例子的搜索","authors":"Haoyang Jiang, Qingkui Song, J. Kernec","doi":"10.1109/UCET51115.2020.9205320","DOIUrl":null,"url":null,"abstract":"Deep learning technology achieves state of the art result in many computer vision missions. However, some researchers point out that current widely used deep learning architectures are vulnerable to adversarial examples. Adversarial examples are inputs generated by applying small and often imperceptible perturbation to examples in the dataset, such that the perturbed examples can degrade the performance of the deep learning architecture.In the paper, we propose a novel adversarial examples generation method. Adversarial examples generated using this method can have small perturbation and have more diversity compare to adversarial examples generated by other method.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Searching the Adversarial Example in the Decision Boundary\",\"authors\":\"Haoyang Jiang, Qingkui Song, J. Kernec\",\"doi\":\"10.1109/UCET51115.2020.9205320\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deep learning technology achieves state of the art result in many computer vision missions. However, some researchers point out that current widely used deep learning architectures are vulnerable to adversarial examples. Adversarial examples are inputs generated by applying small and often imperceptible perturbation to examples in the dataset, such that the perturbed examples can degrade the performance of the deep learning architecture.In the paper, we propose a novel adversarial examples generation method. Adversarial examples generated using this method can have small perturbation and have more diversity compare to adversarial examples generated by other method.\",\"PeriodicalId\":163493,\"journal\":{\"name\":\"2020 International Conference on UK-China Emerging Technologies (UCET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on UK-China Emerging Technologies (UCET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UCET51115.2020.9205320\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on UK-China Emerging Technologies (UCET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UCET51115.2020.9205320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Searching the Adversarial Example in the Decision Boundary
Deep learning technology achieves state of the art result in many computer vision missions. However, some researchers point out that current widely used deep learning architectures are vulnerable to adversarial examples. Adversarial examples are inputs generated by applying small and often imperceptible perturbation to examples in the dataset, such that the perturbed examples can degrade the performance of the deep learning architecture.In the paper, we propose a novel adversarial examples generation method. Adversarial examples generated using this method can have small perturbation and have more diversity compare to adversarial examples generated by other method.