Login / Signup
Energy Attack: On Transferring Adversarial Examples.
Ruoxi Shi
Borui Yang
Yangzhou Jiang
Chenglong Zhao
Bingbing Ni
Published in:
CoRR (2021)
Keyphrases
</>
training examples
energy minimization
information systems
data sets
databases
training data
active learning
malicious users