Skip to main content
Fig. 3 | Cybersecurity

Fig. 3

From: Attack based on data: a novel perspective to attack sensitive points directly

Fig. 3

In Part A, in the section of the perturbation parameters transformability experiment, the perturbation parameters generated by the ResNet architecture are input into the Inception and Encoder architectures. To be specific, we have done the test for each pair of architectures, the result show as Fig. 6. In the step of training predictive models, global statistical features and classified statistical features are used to train predictive models respectively. In Part B, sensitive curve is used as a visual representation of sensitive rate

Back to article page