Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a new attack based on improved Hasofer-Lind, Rackwitz-Fiessler #694

Open
wants to merge 4 commits into
base: master
Choose a base branch
from

Conversation

p-chaurand
Copy link

Implementation of the minimization algorithm iHL-RF ( https://link.springer.com/content/pdf/10.1007/978-0-387-34866-7_32.pdf ) adapted for adversarial attack. This is a minimization attack that work faster and with a lower distortion on (at least) the network efficientnet b0. The predetermined args seems to be the best one to have a fast adversarial example while having a lower distortion than cw or deepfool.

Paul Chaurand and others added 2 commits July 12, 2022 16:40
…reliability).

This is a minimization attack that seems to work much faster and with a lower distortion than cw and deepfool (stats made on 1000 images from imagenet with efficientnet b0).
The automatical args seems to be the best to have a fast algorithm while having a low distortion.
This attack is only implemented for L2 norm.
… reliability).

This is a minimization attack that seems to work much faster and with a lower distortion than cw and deepfool (stats made on 1000 images from imagenet with efficientnet b0).
The automatical args seems to be the best to have a fast algorithm while having a low distortion.
This attack is only implemented for L2 norm.
@p-chaurand
Copy link
Author

p-chaurand commented Jul 13, 2022

Here are a few comparison between carlini wagner (10*50 steps) , deepfool (100 steps with 10 loss) and iHL-RF attack (50 steps with abort early after 25 steps). These graph has been made with the model efficientnet b0 on 1000 images.
The runtime for this attack are the following : 2m10 for iHL-RF, 30m for cw and 3m for deepfool. (with an A100-PCIE-40GB)
comparison between cw, deepfool and iHL-RF attacks.pdf

Change initial parameter tau for a faster calcul
@p-chaurand
Copy link
Author

Implementation by Paul Chaurand (ENS Rennes) under the supervision of Teddy Furon (Inria Rennes) of the Hasofer Lind Racwitz Flessler method
Rackwitz R., & Flessler B., Structural reliability under combined random load sequences. Computers & Structures, vol. 9, no. 5, pp. 489-494, 1978.
Summer 2022

corrects the fact that the images must be in the model bounds.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant