One pixel attack for fooling deep neural networks

From statwiki
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Presented by

1. Ziheng Chu

2. Minghao Lu

3. Qi Mai

4. Qici Tan

Introduction

Methodology

We first formalize the generation of adversarial images as an constrained optimization problem. Let [math]\displaystyle{ \textbf{x} }[/math] be the vectorized form of an image. Let [math]\displaystyle{ f_t(\textbf{x}) }[/math] be

Evaluation and Results

Measurement Metrics and Datasets

Results

Discussion and Future Work