Login / Signup
Improving transferability of adversarial examples with powerful affine-shear transformation attack.
Xiaotong Wang
Chunguang Huang
Hai Cheng
Published in:
Comput. Stand. Interfaces (2023)
Keyphrases
</>
high level
database
website
image registration
affine invariant
countermeasures
geometric transformations
transformation model
neural network
information retrieval
genetic algorithm
affine transformation
linear transformation