1 code implementation • 19 Dec 2021 • Qidong Huang, Jie Zhang, Wenbo Zhou, WeimingZhang, Nenghai Yu
To this end, we first imitate the target manipulation model with a surrogate model, and then devise a poison perturbation generator to obtain the desired venom.