Fig. 5From: DTA: distribution transform-based attack for query-limited scenarioThe performance of DTA when using different numbers of attack modelsBack to article page