Research Article
Evasion Attacks on Deep Learning-Based Helicopter Recognition Systems
Figure 5
An sampling of the adversarial example for the (a) original, (b) proposed, (c) styless, (d) styless-mi, (e) styless-mi-ti, and (f) styless-mi-ti-di methods.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |