Skip to main content
Fig. 6 | Cybersecurity

Fig. 6

From: Attack based on data: a novel perspective to attack sensitive points directly

Fig. 6

The result of perturbation parameters transformability experiment. Specifically, the second line represents the ASR that the perturbation parameters generated by the FCN architecture used to attack the ResNet, MLP, Encoder, Inception, CNN architectures. In particular, the ASR of attacking the ResNet architecture using the perturbation parameters generated by other architectures is very low

Back to article page