Fig. 2From: A survey of practical adversarial example attacksThreat model for theoretical adversarial example attackBack to article page