1 code implementation • 10 Dec 2020 • Itai Lang, Uriel Kotlicki, Shai Avidan
Additionally, we demonstrate the robustness of our attack in the case of defense, where we show that remnant characteristics of the target shape are still present at the output after applying the defense to the adversarial input.