Headless Horseman: Adversarial Attacks on Transfer Learning Models

04/20/2020
by   Ahmed Abdelkader, et al.
0

Transfer learning facilitates the training of task-specific classifiers using pre-trained models as feature extractors. We present a family of transferable adversarial attacks against such classifiers, generated without access to the classification head; we call these headless attacks. We first demonstrate successful transfer attacks against a victim network using only its feature extractor. This motivates the introduction of a label-blind adversarial attack. This transfer attack method does not require any information about the class-label space of the victim. Our attack lowers the accuracy of a ResNet18 trained on CIFAR10 by over 40%.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/19/2021

Fortify Machine Learning Production Systems: Detect and Classify Adversarial Attacks

Production machine learning systems are consistently under attack by adv...
research
04/14/2022

Robotic and Generative Adversarial Attacks in Offline Writer-independent Signature Verification

This study explores how robots and generative approaches can be used to ...
research
01/23/2019

Programmable Neural Network Trojan for Pre-Trained Feature Extractor

Neural network (NN) trojaning attack is an emerging and important attack...
research
04/27/2020

Transferable Perturbations of Deep Feature Distributions

Almost all current adversarial attacks of CNN classifiers rely on inform...
research
06/11/2019

Mimic and Fool: A Task Agnostic Adversarial Attack

At present, adversarial attacks are designed in a task-specific fashion....
research
01/26/2021

Adversarial Vulnerability of Active Transfer Learning

Two widely used techniques for training supervised machine learning mode...
research
06/13/2021

Target Model Agnostic Adversarial Attacks with Query Budgets on Language Understanding Models

Despite significant improvements in natural language understanding model...

Please sign up or login with your details

Forgot password? Click here to reset