3 code implementations • 6 Mar 2020 • Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin
However, it is well-known that machine learning models are vulnerable to adversarial examples (AEs).
Cryptography and Security