no code implementations • 30 Aug 2018 • Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller
Such popularity, however, may attract attackers to exploit the vulnerabilities of the deployed deep learning models and launch attacks against security-sensitive applications.