The most convenient way to use D2 is to just run it as a CLI executable to produce SVGs from .d2 files. You can run the install script with --dry-run to see the ...
Abstract: Object detectors have demonstrated vulnerability to adversarial examples crafted by small perturbations that can deceive the object detector. Existing adversarial attacks mainly focus on ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results