Skip to content

hsouri/REDRL

Repository files navigation

Identifying Attack-Specific Signatures in Adversarial Examples

This repository is the official implementation of the Identifying Attack-Specific Signatures in Adversarial Examples.

Overview

Getting Started

Clone this repository into a directory of your choosing with the following command:

cd path/to/your/directory/
git clone https://github.com/hsouri/REDRL

Next go into the cloned directory cd ./REDRL and create a directory for future checkpoints by the following command:

mkdir checkpoints

At this point the repository structure should be ready. In the next step make sure that the provided path to the pre-trained image classifiers models and the data is correct in the ./tools/path.py script. If not modify them accordingly.

To start trainig the pipeline go to ./experiment_scripts/ and run the following command:

sh $dataset_train.sh

Before start to train, make sure all the settings such as involved loss functions, their weights, and etc are the ones you would want.

Citations

Please cite our paper:

@inproceedings{souri2024identifying,
  title={Identifying Attack-Specific Signatures in Adversarial Examples},
  author={Souri, Hossein and Khorramshahi, Pirazh and Lau, Chun Pong and Goldblum, Micah and Chellappa, Rama},
  booktitle={ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
  pages={7050--7054},
  year={2024},
  organization={IEEE}
}

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published