Login / Signup
Intermediate-Layer Transferable Adversarial Attack With DNN Attention.
Shanshan Yang
Yu Yang
Linna Zhou
Rui Zhan
Yufei Man
Published in:
IEEE Access (2022)
Keyphrases
</>
visual attention
multi layer
countermeasures
key exchange protocol
data sets
databases
computer vision
information systems
data mining techniques
lightweight
training process
focus of attention
secret key
authentication protocol
application layer