Skip to content

Kaleidescope/Patch-wise-iterative-attack

 
 

Repository files navigation

Patch-wise Iterative Attack (accpeted by ECCV2020)

This is the Tensorflow code for our paper Patch-wise Attack for Fooling Deep Neural Network, and Pytorch version can be found at here.

In our paper, we propose a novel Patch-wise Iterative Attack by using the amplification factor and guiding gradient to its feasible direction. Comparing with state-of-the-art attacks, we further improve the success rate by 3.7% for normally trained models and 9.1% for defense models on average. We hope that the proposed methods will serve as a benchmark for evaluating the robustness of various deep models and defense methods.

To our delight, our PI-FGSM also has a very good enhancement effect on targeted attacks. Compared with Po-FGSM + Triple loss + DI-FGSM + TI-FGSM + MI-FGSM, our method (only PI-FGSM) can improve the transferability about 10%~15% for some normally trained models (e.g., Resnet-152, Resnet-101, Resnet-50) and our DTPI-FGSM (PI-FGSM + DI-FGSM + TI-FGSM) can improve the transferability about 25% for some defense models (e.g., Inc-v3_{ens}). We are going to extend our work soon.

Implementation

Results

result

Citing this work

If you find this work is useful in your research, please consider citing:

@inproceedings{Zhang2020PatchWise,
    title={Patch-wise Attack for Fooling Deep Neural Network},
    author={Gao, Lianli and Zhang, Qilong and Song, jingkuan and Liu, Xianglong and Shen, Hengtao},
    Booktitle = {European Conference on Computer Vision},
    year={2020}
}

About

Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%