Alert button

One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy

Oct 23, 2018
Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas Spanos

Figure 1 for One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy
Figure 2 for One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy
Figure 3 for One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy
Figure 4 for One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: