Login / Signup

How to choose your best allies for a transferable attack?

Thibault MahoSeyed-Mohsen Moosavi-DezfooliTeddy Furon
Published in: ICCV (2023)
Keyphrases
  • countermeasures
  • machine learning
  • decision making
  • web applications
  • secret key
  • cyber attacks
  • malicious users