Research Article

Evasion Attacks on Deep Learning-Based Helicopter Recognition Systems

Figure 5

An sampling of the adversarial example for the (a) original, (b) proposed, (c) styless, (d) styless-mi, (e) styless-mi-ti, and (f) styless-mi-ti-di methods.
(a)
(b)
(c)
(d)
(e)
(f)