allenhzy commited on
Commit
810109b
·
1 Parent(s): e589903
Files changed (1) hide show
  1. index.html +1 -1
index.html CHANGED
@@ -422,7 +422,7 @@
422
  <p>
423
  Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
424
  and the detection strategy. For an SSL model with a feature extractor <equation-inline>f</equation-inline>, a projector $h$, and a classification head $g$,
425
- the classification branch can be formulated as $\mathbb{C} = f\circ g$ and the representation branch as $\mathbb{R} = f\circ h$.
426
  To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
427
  </div>
428
  </div>
 
422
  <p>
423
  Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
424
  and the detection strategy. For an SSL model with a feature extractor <equation-inline>f</equation-inline>, a projector $h$, and a classification head $g$,
425
+ the classification branch can be formulated as <equation-inline>\mathbb{C} = f\circ g</equation-inline> and the representation branch as $\mathbb{R} = f\circ h$.
426
  To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
427
  </div>
428
  </div>