Evaluating Transferability of Attacks across Generative Models

Journal Title: Engineering and Technology Journal - Year 2024, Vol 9, Issue 06

Abstract

The need for adversarial sample transferability is to attack black-box deep learning models. Whereas much recent work focuses on making untargeted adversarial attacks more transferable, there has been scarce research on the creation of transferable targeted adversarial instances that can trick models into believing they are of a particular class. The present transferable targeted adversarial attacks are not transferable since they cannot sufficiently define the distribution of target classes. In this paper, we propose a generative adversarial training system consisting of a feature-label dual discriminator to identify the adversarial instances formed from the target class images and a generator to construct targeted adversarial examples. It is concluded that adversarial scenarios have significant real-world applications in safety-critical fields like biometrics and autonomous driving. In addition, it is demonstrated that the current networks' susceptibility to hostile attacks, even under the worst black-box conditions has far-reaching societal consequences. We intend to further encourage more research into the inner workings of neural networks in the face of adversarial attacks, whereby people might use this knowledge to build robust defense mechanisms.

Authors and Affiliations

Rohith Vallabhaneni

Keywords

Related Articles

INFLUENCE OF TIO₂ PARTICLES REINFORCEMENT ON MICROSTRUCTURE AND MECHANICAL PROPERTIES OF AL-ZN-MG ALLOY

This research aims to study the influence of TiO₂ particulate reinforcement addition by different weight percent (0.5, 1.5, 2.5%) on the microstructural and mechanical properties of Al-Zn-Mg alloy. The base alloy and com...

COMPOSITIONAL AND STRUCTURAL ANALYSIS OF SELECTED CROP RESIDUES AND POTENTIAL APPLICATIONS

Population growth, increased food production and consumption, and industrialization have increased the number of crop residues generated in contemporary times. Inappropriate disposal of crop residues pollutes the atmosph...

Energy Consumption Management in IoT by Load Balancing at Near-Root Nodes in RPL Protocol

Managing energy consumption in Internet of Things constitutes a challenge for researchers. Many existing works address this question. Some approaches propose solutions based on artificial intelligence. Other studies are...

Estimation of Solar Power Generation Through the Use of Effective Forecasting Algorithms

The unpredictable nature of solar power generation poses significant challenges to energy management, particularly in power grids with high solar penetration, leading to potential imbalances between supply and demand. Th...

ENHANCING THE ENERGY EFFICIENCY OF WBAN SENSOR NODES BY EMPLOYING FUZZY LOGIC TECHNIQUE

Restricted size of the battery results in limited energy storage and various other problems likely. So the sensors should be properly used during their energy use, as their batteries are not to be replaced quite often. E...

Download PDF file
  • EP ID EP738073
  • DOI -
  • Views 39
  • Downloads 0

How To Cite

Rohith Vallabhaneni (2024). Evaluating Transferability of Attacks across Generative Models. Engineering and Technology Journal, 9(06), -. https://europub.co.uk/articles/-A-738073