1 code implementation • 3 May 2024 • Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou
Our scheme checks the effectiveness of these adversarial examples on a suspect model to determine whether it has been derived from the original model.