1 code implementation • 15 Feb 2022 • Amir Belder, Gal Yefet, Ran Ben Izhak, Ayellet Tal
The key idea is to train a network to imitate a given classification network.
Adversarial Attack Classification