Algorithm 1 Construction of synthetic network g in Papernot’s oracle based black-box attack [24] |
-
1:
Input:
-
2:
represents black-box access to for target model f with output function F;
-
3:
, where is the training data set of target model f;
-
4:
substitute architecture S
-
5:
training method ;
-
6:
constant ;
-
7:
number N of synthetic training epochs
-
8:
Output:
-
9:
synthetic model s defined by parameters
-
10:
(s also has output function F which selects the max confidence score;
-
11:
s fits architecture S)
-
12:
-
13:
Algorithm:
-
14:
for N iterations do
-
15:
-
16:
-
17:
-
18:
end for
-
19:
Output
|