One pixel attack for fooling deep neural networks
Presented by
1. Ziheng Chu
2. Minghao Lu
3. Qi Mai
4. Qici Tan
Introduction
Methodology
We first formalize the generation of adversarial images as an constrained optimization problem. Let $f_t$
1. Ziheng Chu
2. Minghao Lu
3. Qi Mai
4. Qici Tan
We first formalize the generation of adversarial images as an constrained optimization problem. Let $f_t$