all InfoSec news
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. (arXiv:2204.04063v1 [cs.CV])
April 11, 2022, 1:20 a.m. | Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang
cs.CR updates on arXiv.org arxiv.org
One intriguing property of adversarial attacks is their "transferability" --
an adversarial example crafted with respect to one deep neural network (DNN)
model is often found effective against other DNNs as well. Intensive research
has been conducted on this phenomenon under simplistic controlled conditions.
Yet, thus far, there is still a lack of comprehensive understanding about
transferability-based attacks ("transfer attacks") in real-world environments.
To bridge this critical gap, we conduct the first large-scale systematic
empirical study of transfer attacks against …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Check Team Members / Cyber Consultants / Pen Testers
@ Resillion | Birmingham, United Kingdom
Security Officer Field Training Officer- Full Time (Harrah's LV)
@ Caesars Entertainment | Las Vegas, NV, United States
Cybersecurity Subject Matter Expert (SME)
@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States
AWS Security Engineer
@ IntelliPro Group Inc. | Palo Alto, CA
Information Security Analyst
@ Freudenberg Group | Alajuela