Web: http://arxiv.org/abs/2211.13171

Nov. 24, 2022, 2:10 a.m. | Rohit Gupta, Naveed Akhtar, Gaurav Kumar Nayak, Ajmal Mian, Mubarak Shah

cs.CR updates on arXiv.org arxiv.org

Black-box adversarial attacks present a realistic threat to action
recognition systems. Existing black-box attacks follow either a query-based
approach where an attack is optimized by querying the target model, or a
transfer-based approach where attacks are generated using a substitute model.
While these methods can achieve decent fooling rates, the former tends to be
highly query-inefficient while the latter assumes extensive knowledge of the
black-box model's training data. In this paper, we propose a new attack on
action recognition that …

action attack black box recognition

Operational Technology Cyber Security Consultant

@ PA Consulting | Edinburgh, United Kingdom

Cyber Security Analyst I

@ Humanity | Cincinnati, OH, United States

IT Security Analyst Specialist

@ Humanity | Phoenix, AZ, United States

IT Security Analyst Senior

@ Humanity | Phoenix, AZ, United States

Managed Network Detection & Response Analyst (REMOTE)

@ Arista Networks | Vancouver, BC, Canada

Director, Next Generation Firewall Customer Success

@ Palo Alto Networks | Raleigh, NC, United States

Cyber Security engineer

@ LACROIX | Rennes, France

Cyber Security Engineer(台北)

@ SGS | Taipei, Taiwan

Duales Studium Elektrotechnik mit Schwerpunkt Cyber Security (w/m/div.) - anteilig remote

@ Bosch Group | Rülzheim, Germany

Cloud Security Controls Expert

@ PA Consulting | London, United Kingdom

Cybersecurity Audit Manager

@ ServiceNow | Santa Clara, CALIFORNIA, United States

Security Solution Administrator - Platform Operation (REF1249B)

@ Deutsche Telekom IT Solutions | Pécs, Budapest, Szeged, Debrecen, Hungary