Fig. 3From: Multitask adversarial attack with dispersion amplificationResults of dispersion amplification attacks using different number of iterations. Each plot represents a different target model while each line—a different substitute modelBack to article page