Hi, thanks for the sharing codes and it's a solid work. But I have some questions about Adaptive Attacks.
(1) What's your adaptive attacks based on? CW, PGD or FGSM?
(2) I'm more interested in the codes how you can generate adaptive attacks mentioned in your paper. If convenient, could you include the more detailed command line to generate adaptive attacks?
Hi, thanks for the sharing codes and it's a solid work. But I have some questions about Adaptive Attacks. (1) What's your adaptive attacks based on? CW, PGD or FGSM? (2) I'm more interested in the codes how you can generate adaptive attacks mentioned in your paper. If convenient, could you include the more detailed command line to generate adaptive attacks?
Thanks for your help!