no code implementations • 31 Aug 2017 • Ambra Demontis, Paolo Russu, Battista Biggio, Giorgio Fumera, Fabio Roli
However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test time to evade detection.