Fig. 2From: Multitask adversarial attack with dispersion amplificationResults of dispersion amplification attacks using different substitute models. Each plot represents a different target model while each line is a different substitute modelBack to article page