Publication not explained

This publication has not yet been explained in plain language by the author(s). However, you can still read the publication.

If you are one of the authors, claim this publication so you can create a plain language summary to help more people find, understand and use it.

Featured Image

Read the Original

This page is a summary of: Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples, ACM Transactions on Software Engineering and Methodology, March 2024, ACM (Association for Computing Machinery),
DOI: 10.1145/3631977.
You can read the full text:

Read

Contributors

The following have contributed to this page