Transferable Adversarial Attacks on SAM and Its Downstream Models

Open in new window