Press ESC to close

Stealthiness

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights

root 0

The article revisits the transferable adversarial examples, which are a significant security concern in real-world, black-box attack scenarios. The authors identify two main problems in common evaluation practices: lack of…

Continue reading