Search Results for author: Thibault Maho

Found 5 papers, 3 papers with code

How to choose your best allies for a transferable attack?

1 code implementation ICCV 2023 Thibault Maho, Seyed-Mohsen Moosavi-Dezfooli, Teddy Furon

The transferability of adversarial examples is a key issue in the security of deep neural networks.

FBI: Fingerprinting models with Benign Inputs

no code implementations5 Aug 2022 Thibault Maho, Teddy Furon, Erwan Le Merrer

We achieve both goals by demonstrating that benign inputs, that are unmodified images, for instance, are sufficient material for both tasks.

Quantization

Randomized Smoothing under Attack: How Good is it in Pratice?

no code implementations28 Apr 2022 Thibault Maho, Teddy Furon, Erwan Le Merrer

We first formally highlight the mismatch between a theoretical certification and the practice of attacks on classifiers.

SurFree: a fast surrogate-free black-box attack

1 code implementation CVPR 2021 Thibault Maho, Teddy Furon, Erwan Le Merrer

This paper presents SurFree, a geometrical approach that achieves a similar drastic reduction in the amount of queries in the hardest setup: black box decision-based attacks (only the top-1 label is available).

Adversarial Attack

Cannot find the paper you are looking for? You can Submit a new open access paper.