Fig. 3From: A survey of practical adversarial example attacksThreat model for practical adversarial example attackBack to article page