Defending Against Model Stealing Attacks Using Deceptive Perturbations

Add code
Sep 19, 2018
Figure 1 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 2 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 3 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 4 for Defending Against Model Stealing Attacks Using Deceptive Perturbations

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: