no code implementations • 6 Sep 2018 • Zilong Lin, Yong Shi, Zhi Xue
Given that the internal structure and parameters of the detection system are unknown to attackers, the adversarial attack examples perform the black-box attacks against the detection system.