no code implementations • ICCV 2023 • Yaguan Qian, Shuke He, Chenyu Zhao, Jiaqiang Sha, Wei Wang, Bin Wang
However, most existing ensemble attacks depend on numerous substitute models to cover the vulnerable subspace of a target model.
Adversarial Attack