allenhzy commited on
Commit
b7e9852
·
1 Parent(s): 75fab0b
Files changed (1) hide show
  1. index.html +5 -5
index.html CHANGED
@@ -420,15 +420,15 @@
420
  <div class="column has-text-justified">
421
  <p>
422
  Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
423
- and the detection strategy. For an SSL model with a feature extractor $$f$$, a projector $$h$$, and a classification head $$g$$,
424
- the classification branch can be formulated as $$\mathbb{C} = f\circ g$$ and the representation branch as $$\mathbb{R} = f\circ h$$.
425
  To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
426
 
427
- where $$\mathcal{S}$$ represents cosine similarity, $$k$$ represents the number of generated neighbors,
428
- and the linear augmentation function $$W(x)=W(x,p);~p\sim P$$ randomly samples $$p$$ from the parameter distribution $$P$$ to generate different neighbors.
429
  Note that we guarantee the generated neighbors are fixed each time by fixing the random seed. The adaptive adversaries perform attacks on the following objective function:
430
 
431
- where $$\mathcal{L}_C$$ indicates classifier's loss function, $$y_t$$ is the targeted class, and $$\alpha$$ refers to a hyperparameter.
432
  </div>
433
  </div>
434
 
 
420
  <div class="column has-text-justified">
421
  <p>
422
  Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
423
+ and the detection strategy. For an SSL model with a feature extractor $f$, a projector $h$, and a classification head $g$,
424
+ the classification branch can be formulated as $\mathbb{C} = f\circ g$ and the representation branch as $\mathbb{R} = f\circ h$.
425
  To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
426
 
427
+ where $\mathcal{S}$ represents cosine similarity, $k$ represents the number of generated neighbors,
428
+ and the linear augmentation function $W(x)=W(x,p);~p\sim P$ randomly samples $p$ from the parameter distribution $P$ to generate different neighbors.
429
  Note that we guarantee the generated neighbors are fixed each time by fixing the random seed. The adaptive adversaries perform attacks on the following objective function:
430
 
431
+ where $\mathcal{L}_C$ indicates classifier's loss function, $y_t$ is the targeted class, and $\alpha$ refers to a hyperparameter.
432
  </div>
433
  </div>
434