Login / Signup
How to choose your best allies for a transferable attack?
Thibault Maho
Seyed-Mohsen Moosavi-Dezfooli
Teddy Furon
Published in:
ICCV (2023)
Keyphrases
</>
countermeasures
machine learning
decision making
web applications
secret key
cyber attacks
malicious users