Fig. 3From: IPatch: a remote adversarial patchSome illustrative examples showing how a remote adversarial patch can be used by an attackerBack to article page