Figure 8
Each row illustrates, from left to right: the original (clean) license plate image, the corresponding detected license plate region, and the adversarial example generated using the I-FGSM attack, restricted to the license plate Refer to the image caption for details.

Each row illustrates, from left to right: the original (clean) license plate image, the corresponding detected license plate region, and the adversarial example generated using the I-FGSM attack, restricted to the license plate

or Create an Account

Close Modal
Close Modal