{"updated":"2025-01-19T17:19:14.261172+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00212959","sets":["6164:6165:6640:10712"]},"path":["10712"],"owner":"44499","recid":"212959","title":["Improving The Decision-Based Adversarial Boundary Attack by Square Masked Movement"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-06-23"},"_buckets":{"deposit":"c90a8a3b-aa83-4eb8-8c26-46198419e0ab"},"_deposit":{"id":"212959","pid":{"type":"depid","value":"212959","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Improving The Decision-Based Adversarial Boundary Attack by Square Masked Movement","author_link":["544119","544117","544118","544116"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Improving The Decision-Based Adversarial Boundary Attack by Square Masked Movement"},{"subitem_title":"Improving The Decision-Based Adversarial Boundary Attack by Square Masked Movement","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"AI","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2021-06-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/212959/files/IPSJ-DICOMO2021061.pdf","label":"IPSJ-DICOMO2021061.pdf"},"date":[{"dateType":"Available","dateValue":"2023-06-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DICOMO2021061.pdf","filesize":[{"value":"919.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"628c5fec-17d1-4164-85ae-ac3717dd780f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Van, Sang Tran"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Phuong, Thao Tran"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"山口, 利恵"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中田, 登志之"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Adversarial image attack is a well-known attack methodology in the image recognition field where the input images are purposely modified to make no difference to the human perception but can fool the image recognition models to classify them incorrectly. Recently, the adversarial attack has drawn much attention from researchers due to its ability to fool even state-of-the-art and commercial image recognition models. Researching the adversarial attack is crucial to know the potential risk, thus preparing needed earlier prevention. In this paper, we investigated an improvement on the Boundary Attack algorithm because of its effectiveness, flexibility and the absent of a direct protection mechanism. Previously, in the randomization step, the Boundary Attack algorithm randomizes the movement vector from the whole image space. In this research, we have improved the algorithm by applying a square mask to the space in this step. We have applied on the CIFAR10 dataset and successfully improved the distance between the adversarial and the original images without increasing the number of queries. Our work suggests a new possibility of an attack vector that can exploit the prior knowledge of the model to improve the distance without affecting the query count.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Adversarial image attack is a well-known attack methodology in the image recognition field where the input images are purposely modified to make no difference to the human perception but can fool the image recognition models to classify them incorrectly. Recently, the adversarial attack has drawn much attention from researchers due to its ability to fool even state-of-the-art and commercial image recognition models. Researching the adversarial attack is crucial to know the potential risk, thus preparing needed earlier prevention. In this paper, we investigated an improvement on the Boundary Attack algorithm because of its effectiveness, flexibility and the absent of a direct protection mechanism. Previously, in the randomization step, the Boundary Attack algorithm randomizes the movement vector from the whole image space. In this research, we have improved the algorithm by applying a square mask to the space in this step. We have applied on the CIFAR10 dataset and successfully improved the distance between the adversarial and the original images without increasing the number of queries. Our work suggests a new possibility of an attack vector that can exploit the prior knowledge of the model to improve the distance without affecting the query count.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"471","bibliographic_titles":[{"bibliographic_title":"マルチメディア,分散協調とモバイルシンポジウム2021論文集"}],"bibliographicPageStart":"466","bibliographicIssueDates":{"bibliographicIssueDate":"2021-06-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"2021"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:13:52.787262+00:00","id":212959,"links":{}}