Spaces:
Running
Running
equation
Browse files- index.html +1 -1
index.html
CHANGED
@@ -422,7 +422,7 @@
|
|
422 |
<p>
|
423 |
Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
|
424 |
and the detection strategy. For an SSL model with a feature extractor <equation-inline>f</equation-inline>, a projector $h$, and a classification head $g$,
|
425 |
-
the classification branch can be formulated as
|
426 |
To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
|
427 |
</div>
|
428 |
</div>
|
|
|
422 |
<p>
|
423 |
Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
|
424 |
and the detection strategy. For an SSL model with a feature extractor <equation-inline>f</equation-inline>, a projector $h$, and a classification head $g$,
|
425 |
+
the classification branch can be formulated as <equation-inline>\mathbb{C} = f\circ g</equation-inline> and the representation branch as $\mathbb{R} = f\circ h$.
|
426 |
To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
|
427 |
</div>
|
428 |
</div>
|