Question: 2. Alice and Bob are deep learning engineers working at two rival start-ups. They are both trying to deliver the same neural network-based product. Alice

 2. Alice and Bob are deep learning engineers working at two

2. Alice and Bob are deep learning engineers working at two rival start-ups. They are both trying to deliver the same neural network-based product. Alice and Bob do not have access to each other's models and code. However, they can query each other's models as much as they'd like. (i) Name a type of neural network attack that Alice cannot use against Bob's model and explain why it cannot be used in this case. (ii) How can Alice forge an image xiguana which looks like an iguana but will be wrongly classified as a plant by Bob's model? Give an iterative method and explicitly mention the loss function. (iii) Alice doesn't have access to Bob's network. How can she still generate an adversarial example using the method described above? (iv) To defend himself against Alice's attacks, Bob is thinking of using dropout. Dropout randomly shuts down certain neurons of the network and makes it more robust to changes in the input. Thus, Bob has the intuition that the network will be less vulnerable to adversarial examples. Is Bob correct? Explain why or why not

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!