One pixel attack for fooling deep neural networks: Difference between revisions
Jump to navigation
Jump to search
Line 15: | Line 15: | ||
We first formalize the generation of adversarial images as an constrained optimization problem. | We first formalize the generation of adversarial images as an constrained optimization problem. | ||
Let <math>\ | Let <math>\textbf{x}</math> be the vectorized form of an image. Let <math>f_t(\textbf{x})</math> be | ||
= Evaluation and Results = | = Evaluation and Results = |
Revision as of 21:55, 25 March 2018
Presented by
1. Ziheng Chu
2. Minghao Lu
3. Qi Mai
4. Qici Tan
Introduction
Methodology
We first formalize the generation of adversarial images as an constrained optimization problem. Let [math]\displaystyle{ \textbf{x} }[/math] be the vectorized form of an image. Let [math]\displaystyle{ f_t(\textbf{x}) }[/math] be