Skip to main content
. 2021 Oct 18;23(10):1359. doi: 10.3390/e23101359
Algorithm 1 Construction of synthetic network g in Papernot’s oracle based black-box attack [24]
  • 1:

    Input:

  • 2:

            O represents black-box access to F(f(·)) for target model f with output function F;

  • 3:

            X0X, where X is the training data set of target model f;

  • 4:

            substitute architecture S

  • 5:

            training method M;

  • 6:

            constant λ;

  • 7:

            number N of synthetic training epochs

  • 8:

    Output:

  • 9:

            synthetic model s defined by parameters θs

  • 10:

            (s also has output function F which selects the max confidence score;

  • 11:

            s fits architecture S)

  • 12:

     

  • 13:

    Algorithm:

  • 14:

    for N iterations do

  • 15:

        D{(x,O(x)):xXt}

  • 16:

        θs=M(S,D)

  • 17:

        Xt+1{x+λ·sgn(Jθs(x)[O(x)]):xXt}Xt

  • 18:

    end for

  • 19:

    Output θs