A Theory of Transfer-Based Black-Box Attacks: Explanation and Implications

Open in new window