Picture for David Aaron Nicholson

David Aaron Nicholson

Reverse engineering adversarial attacks with fingerprints from adversarial examples

Add code
Feb 01, 2023
Figure 1 for Reverse engineering adversarial attacks with fingerprints from adversarial examples
Figure 2 for Reverse engineering adversarial attacks with fingerprints from adversarial examples
Figure 3 for Reverse engineering adversarial attacks with fingerprints from adversarial examples
Figure 4 for Reverse engineering adversarial attacks with fingerprints from adversarial examples
Viaarxiv icon