OnDoc
| sign
in
up
~
pub
|
pdf
txt
html
toc
url
|
<<
>>
1
~
7
8
9
10
11
12
13
14
Table of Contents
1 Introduction
2 About Deep Neural Networks
3 Threat Model
4 Black-Box Attack Strategy
4.1 Substitute Model Training
4.2 Adversarial Sample Crafting
5 Validation of the Attack
5.1 Attack against the MetaMind Oracle
5.2 Attacking an oracle for the GTSRB
6 Attack Algorithm Calibration
6.1 Calibrating Substitute DNN Training
6.2 Adversarial Sample Crafting
7 Generalization of the Attack
7.1 Generalizing Substitute Learning
7.2 Attacks against Amazon & Google oracles
8 Defense Strategies
9 Conclusions
10 References
11 Acknowledgments