Spaces:
Running
Running
equation
Browse files- index.html +1 -1
index.html
CHANGED
@@ -421,7 +421,7 @@
|
|
421 |
<div class="column container">
|
422 |
<p>
|
423 |
Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
|
424 |
-
and the detection strategy. For an SSL model with a feature extractor
|
425 |
the classification branch can be formulated as $\mathbb{C} = f\circ g$ and the representation branch as $\mathbb{R} = f\circ h$.
|
426 |
To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
|
427 |
</div>
|
|
|
421 |
<div class="column container">
|
422 |
<p>
|
423 |
Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
|
424 |
+
and the detection strategy. For an SSL model with a feature extractor <equation-inline>f</equation-inline>, a projector $h$, and a classification head $g$,
|
425 |
the classification branch can be formulated as $\mathbb{C} = f\circ g$ and the representation branch as $\mathbb{R} = f\circ h$.
|
426 |
To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
|
427 |
</div>
|