Press ESC to close

Cryptography and Security

The study of securing information and communication systems, including encryption techniques and network security.

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights

root 0

The article revisits the transferable adversarial examples, which are a significant security concern in real-world, black-box attack scenarios. The authors identify two main problems in common evaluation practices: lack of…

Continue reading