A Theory of Transfer-Based Black-Box Attacks: Explanation and Implications (Supplementary Material) Anonymous Author(s) Affiliation Address email

Open in new window