Research Article

Evasion Attacks on Deep Learning-Based Helicopter Recognition Systems

Figure 2

An example of the original sample and the adversarial example: (a) original sample and (b) adversarial example.
(a)
(b)