Tags

backdoor attacks
model compression
transfer attacks
scalable attacks