There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Repository Details
Re-implementations of adversarial attacks (Deepfool and I-FGSM) for breaking pre-trained machine learning models with an added objective of minimising/maximising L2 norm of images.