OnDoc
| sign
in
up
~
pub
|
pdf
txt
html
toc
url
|
<<
>>
1
2
3
4
5
6
7
8
~
14
Table of Contents
1 Introduction
2 About Deep Neural Networks
3 Threat Model
4 Black-Box Attack Strategy
4.1 Substitute Model Training
4.2 Adversarial Sample Crafting
5 Validation of the Attack
5.1 Attack against the MetaMind Oracle
5.2 Attacking an oracle for the GTSRB
6 Attack Algorithm Calibration
6.1 Calibrating Substitute DNN Training
6.2 Adversarial Sample Crafting
7 Generalization of the Attack
7.1 Generalizing Substitute Learning
7.2 Attacks against Amazon & Google oracles
8 Defense Strategies
9 Conclusions
10 References
11 Acknowledgments