allenhzy commited on
Commit
03a2979
·
1 Parent(s): 389972a
Files changed (1) hide show
  1. index.html +3 -3
index.html CHANGED
@@ -421,8 +421,8 @@
421
  <div class="column container">
422
  <p>
423
  Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
424
- and the detection strategy. For an SSL model with a feature extractor $\displaystyle f$, a projector $\displaystyle h$, and a classification head $\displaystyle g$,
425
- the classification branch can be formulated as $\displaystyle \mathbb{C} = f\circ g$ and the representation branch as $\displaystyle \mathbb{R} = f\circ h$.
426
  To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
427
  </div>
428
  </div>
@@ -460,7 +460,7 @@
460
  <div class="columns is-centered">
461
  <div class="column container">
462
  <p class="eq-des label-loss">
463
- where $\displaystyle k$ represents the number of generated neighbors, $\displaystyle y_t$ is the target class, and $\displaystyle \mathcal{L} is the cross entropy loss function$
464
  </p>
465
  <p class="eq-des representation-loss" style="display: none">
466
  where $\displaystyle \mathcal{S}$ is the cosine similarity.
 
421
  <div class="column container">
422
  <p>
423
  Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
424
+ and the detection strategy. For an SSL model with a feature extractor $f$, a projector $h$, and a classification head $g$,
425
+ the classification branch can be formulated as $\mathbb{C} = f\circ g$ and the representation branch as $\mathbb{R} = f\circ h$.
426
  To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
427
  </div>
428
  </div>
 
460
  <div class="columns is-centered">
461
  <div class="column container">
462
  <p class="eq-des label-loss">
463
+ where $\displaystyle k$ represents the number of generated neighbors, $\displaystyle y_t$ is the target class, and $\displaystyle \mathcal{L}$ is the cross entropy loss function
464
  </p>
465
  <p class="eq-des representation-loss" style="display: none">
466
  where $\displaystyle \mathcal{S}$ is the cosine similarity.