no code implementations • 6 Dec 2023 • Sajjad Zarifzadeh, Philippe Liu, Reza Shokri
Under computation constraints, where only a limited number of pre-trained reference models (as few as 1) are available, and also when we vary other elements of the attack, our method performs exceptionally well, unlike some prior attacks that approach random guessing.