Fig. 1From: A survey of practical adversarial example attacksAdversarial example illustrationBack to article page