A Second-Order Optimization-Based Adaptive Attack Method for Deep Convolutional Neural Networks
['Jin Ding', 'Jie-Chao Zhao', 'Yong-Zhi Sun', 'Ping Tan', 'Ji-En Ma', 'You-Tong Fang']
/
IEEE Transactions on Reliability
/ Vol. 74
/ No. 4