The most convenient way to use D2 is to just run it as a CLI executable to produce SVGs from .d2 files. You can run the install script with --dry-run to see the ...
Abstract: Object detectors have demonstrated vulnerability to adversarial examples crafted by small perturbations that can deceive the object detector. Existing adversarial attacks mainly focus on ...