Fig. 1From: Multitask adversarial attack with dispersion amplificationAttacker uses a substitute model to craft adversarial image that successfully passes through different models and across different CV tasks (such as classification, object detection, recognition)Back to article page