-
Notifications
You must be signed in to change notification settings - Fork 216
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replicate results seen in arXiv paper #5
Comments
Hi there, |
@Carina02 Thanks for letting me know that you now have an official repository. I'll update my README so that others may find it. |
@Hyperparticle Sorry for the late reply and thanks for the redirection. Recently I was trying to figure out why our results of attack rate are so different from yours, especially on the pure_cnn. Actually I have roughly gone through your code and customized it to our settings (e.g., roughly got ~60% non-targeted attack rate on Net-In-Net) but currently still no idea on the results of pure-cnn . Just wonder if you have any ideas on why this can happen (e.g., any important factors that I did not notice that can affect the attack accuracy so much). |
I was also puzzled by the discrepancy, but I didn't find an answer yet. There could be a range of factors, but the most likely culprit is how the differential evolution is implemented. Another possibility is there might be a discrepancy in my implementation of a pixel perturbation compared to yours. And a third factor could be how the Keras models are implemented. I didn't do any extensive search yet, but you're more than welcome to try to look. |
Thanks for the reply. Another possible factor I can imagine is that I use opencv to read&write real images during iterations while your code directly works with image data. I found that opencv can slightly change the image quality after reading&writing the same image. This probably can make the images more "vulnerable". |
@Carina02 If you have time, you could experiment with this hypothesis. I think it would be simple to import and reload each image with opencv during preprocessing. Did you test this in your own repo? I think if it does influence the attack, it should be reported in your paper. |
@Hyperparticle Sure, will mention this in a future version of paper in Arxiv. It seems that others got similar problems, such as: My rough observation is that the modification by opencv does not change the pixel values totally or just very tiny change but the size of images always increase a little bit after doing imwrite. Will get back to you if have new discovery. |
@Hyperparticle |
@Carina02 Thanks for the update! Glad you were able to find the cause of the discrepancy. |
用的什么环境啊 |
There are some preliminary results of the one-pixel attack performed on Cifar10 in the repo, but it is not quite as comprehensive as seen in https://arxiv.org/abs/1710.08864. It would be nice to not only replicate the experiments but also match (or surpass) their metrics.
The text was updated successfully, but these errors were encountered: