WindVChen / DiffAttack

An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.
Apache License 2.0
115 stars 9 forks source link

request for the FSGM code or parameters in the comparation table #3

Closed ahaha0000 closed 1 year ago

ahaha0000 commented 1 year ago

Thanks for your excellent work. 😃

We wonder the concrete FSGM parameters used in your paper, since we did not find any code for them in this repo. Conventionally, the FSGM parameters are attack steps steps, total threshold eps and the step size alpha. Otherwise, the numerical results should be somewhat explained in the README.md to allow verification.

Thanks again for your response.

WindVChen commented 1 year ago

Hi @ahaha0000 ,

Thanks for your attention. For those I-FGSM-based methods, the number of steps is set to 10, the threshold eps is set to 16, and the step size alpha is set to eps/steps. These parameters are actually aligned with the recent transferable attack methods.

For quick verification, you can directly run the source code of the compared methods without many changes (only change the resolution to 224): PI-FGSM, S2I-FGSM. NCF, PerC-AL. For MI-FGSM, DI-FGSM, and TI-FGSM, we make use of the implementations in S2I-FGSM.

Kahsolt commented 1 year ago

Thanks for your quick response and provided appendant materials 😃