Each row illustrates, from left to right: the original (clean) license plate image, the corresponding detected license plate region, and the adversarial example generated using the I-FGSM attack, restricted to the license plate
Sign In or Create an Account