Fig. 5From: A survey of practical adversarial example attacksImpersonation attacks with eyeglassesBack to article page