no code implementations • 7 Aug 2020 • Shengjun Liu, Ningkang Jiang, Yuanbin Wu
Modifying characters of a piece of text to their visual similar ones often ap-pear in spam in order to fool inspection systems and other conditions, which we regard as a kind of adversarial attack to neural models.