Adversarial Examples in Constrained Domains
2020.
Abstract:
Machine learning algorithms have been shown to be vulnerable to adversarial manipulation through systematic modification of inputs (e.g., adversarial examples) in domains such as image recognition. Under the default threat model, the adversary exploits the unconstrained nature of images; each feature (pixel) is fully under control of th...More
Code:
Data:
Tags
Comments