WeChat Mini Program
Old Version Features

Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY(2024)

Cited 1|Views28
Key words
Multiaccess communication,Closed box,Perturbation methods,Optimization,Estimation,Task analysis,Robustness,Adversarial example,adversarial attack,black-box attack,generative-based attack,conditional diffusion model
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined