The authors of Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks have not publicly listed the code yet.
Request code directly from the authors:
Get an expert to implement this paper:
(OR if you have code to share with the community, please add it here 😊🙏 )