Fig. 11From: Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregationAdversarial examples: (left) original image x, (middle) adversarial example xadv, and (right) absolute value of the adversarial perturbation ε computed as |ε|=|x−xadvv|Back to article page