no code implementations • 31 Jan 2019 • Houpu Yao, Zhe Wang, GuangYu Nie, Yassine Mazboudi, Yezhou Yang, Yi Ren
The vulnerability of neural networks under adversarial attacks has raised serious concerns and motivated extensive research.
Image Cropping Translation