Gradient similarity: An explainable approach to detect adversarial attacks against deep learning

J Dhaliwal, S Shintre - arXiv preprint arXiv:1806.10707, 2018 - arxiv.org
… ric called Gradient Similarity that allows us to capture the influence of training data on test
inputs. We show that Gradient Similarity behaves differently for normal and adversarial inputs, …

Boosting adversarial attacks with transformed gradient

Z He, Y Duan, W Zhang, J Zou, Z He, Y Wang… - Computers & Security, 2022 - Elsevier
… the gradient-based attacks of the image classification task in this paper. Previous researches
focused more on the attack success rate of adversarialsimilarity to measure the similarity

Gradient-based adversarial attacks against text transformers

C Guo, A Sablayrolles, H Jégou, D Kiela - arXiv preprint arXiv:2104.13733, 2021 - arxiv.org
similarity constraints into the adversarial loss, our white-box attack produces more natural
adversarial … The adversarial distribution can be sampled efficiently to query different target …

Nesterov accelerated gradient and scale invariance for adversarial attacks

J Lin, C Song, K He, L Wang, JE Hopcroft - arXiv preprint arXiv …, 2019 - arxiv.org
Similar with the process of training neural networks, the process of generating … a robust
adversarial attack, which we refer to as NI-FGSM (Nesterov Iterative Fast Gradient Sign Method). …

Meta gradient adversarial attack

Z Yuan, J Zhang, Y Jia, C Tan… - Proceedings of the …, 2021 - openaccess.thecvf.com
gradient-based adversarial attack method. The main idea of MGAA is to generate the adversarial
ex… directions in metatrain and meta-test steps as similar as possible, which is consistent …

Improving black-box adversarial attacks with a transfer-based prior

S Cheng, Y Dong, T Pang, H Su… - Advances in neural …, 2019 - proceedings.neurips.cc
… method to generate adversarial examples, except that the true gradient ∇xf(x, … gradient can
remain higher cosine similarity with the true gradient, which facilitates the adversarial attacks

Similarity-based gray-box adversarial attack against deep face recognition

H Wang, S Wang, Z Jin, Y Wang… - 2021 16th IEEE …, 2021 - ieeexplore.ieee.org
… In principle, the adversarial attack exploits the gradient or statistical information to
generate … In this paper, we propose a similarity-based adversarial attack against FR-based …

Boosting adversarial attacks with momentum

Y Dong, F Liao, T Pang, H Su, J Zhu… - Proceedings of the …, 2018 - openaccess.thecvf.com
attack algorithms called momentum iterative gradient-based methods, in which we accumulate
gradients … We calculate the cosine similarity of two successive perturbations and show the …

TextTricker: Loss-based and gradient-based adversarial attacks on text classification models

J Xu, Q Du - Engineering Applications of Artificial Intelligence, 2020 - Elsevier
… -box adversarial attack algorithm on text classification models, TextTricker, which can generate
targeted or non-targeted adversarial … In this way, we show the distribution of similarity to …

Boosting adversarial transferability via gradient relevance attack

H Zhu, Y Ren, X Sui, L Yang… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
… the gradient relevance framework gives the attack a broader receptive scope, which enables
the crafted adversarialsimilarity and the attacking performance, we adopted the average …