no code implementations • 12 Oct 2023 • Ruinan Ma, Canjie Zhu, Mingfeng Lu, Yunjie Li, Yu-an Tan, Ruibin Zhang, Ran Tao
We first propose an attack pipeline under the time-frequency images scenario and DITIMI-FGSM attack algorithm with high transferability.