Nov. 18, 2022, 2:20 a.m. | Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes

cs.CR updates on arXiv.org arxiv.org

Transfer adversarial attacks raise critical security concerns in real-world,
black-box scenarios. However, the actual progress of attack methods is
difficult to assess due to two main limitations in existing evaluations. First,
existing evaluations are unsystematic and sometimes unfair since new methods
are often directly added to old ones without complete comparisons to similar
methods. Second, existing evaluations mainly focus on transferability but
overlook another key attack property: stealthiness. In this work, we design
good practices to address these limitations. We …

adversarial attacks good practices practices

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

IT Security Manager

@ Teltonika | Vilnius/Kaunas, VL, LT

Security Officer - Part Time - Harrah's Gulf Coast

@ Caesars Entertainment | Biloxi, MS, United States

DevSecOps Full-stack Developer

@ Peraton | Fort Gordon, GA, United States

Cybersecurity Cooperation Lead

@ Peraton | Stuttgart, AE, United States

Cybersecurity Engineer - Malware & Forensics

@ ManTech | 201DU - Customer Site,Herndon, VA