Improving the Transferability of Adversarial Attacks by an Input Transpose

Open in new window