资讯

To solve the problem, we considered 15 different low-level heuristics (LLHs) divided between perturbation and local search phases and optimized the search between LLHs using a cross-domain technique ...
Abstract: Deep learning begins to be widely applied in security applications, but the vulnerability of deep learning in front of adversarial examples raises people's concern. In this paper, we study ...