Alert button

Defending Against Model Stealing Attacks Using Deceptive Perturbations

Sep 19, 2018
Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su

Figure 1 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 2 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 3 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 4 for Defending Against Model Stealing Attacks Using Deceptive Perturbations

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: