Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY(2024)
Key words
Multiaccess communication,Closed box,Perturbation methods,Optimization,Estimation,Task analysis,Robustness,Adversarial example,adversarial attack,black-box attack,generative-based attack,conditional diffusion model
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined