Evaluating Impact of Image Transformations on Adversarial Examples
IEEE ACCESS(2024)
Key words
Training,Residual neural networks,Computational modeling,Whales,Perturbation methods,Iron,Deep learning,Data models,Robustness,Predictive models,AI security,adversarial attacks,image transformations,deep learning robustness
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined