J Chen, Y Chen,
H Zheng, S Shen, S Yu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The adversarial attack methods based on gradient information can adequately find the
perturbations, that is, the combinations of rewired links, thereby reducing the effectiveness of …