Chrome Extension
WeChat Mini Program
Use on ChatGLM

Universal Black-box Adversarial Attack for Trajectory Representation Via Controlling High-Dimensional Iterative Constraints

Guangyao Bai,Jie Li,Yucheng Shi,Lei Shi,Yufei Gao, Chenguang Fan, Guanxi Chen

IEEE Internet of Things Journal(2025)

Cited 0|Views0
Key words
Adversarial examples,black-box attack,trajectory representation,Adversarial machine learning
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined