S Long,
W Tao, LI Shuohao, J Lei… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
Adversarial examples are commonly created by solving a constrained optimization problem,
typically using sign-based methods like Fast Gradient Sign Method (FGSM). These attacks …