To Reviewer # 1
–Neural Information Processing Systems
We thank all reviewers for their valuable comments. In what follows, we will respond to their concerns one by one. The author should evaluate different attack methods and show the experimental results. Here we refer to the attack used in our paper as the threshold attack. Actually, we have also shown the results of other attacks (i.e.
Neural Information Processing Systems
Oct-2-2025, 16:02:26 GMT
- Technology: