equation
Browse files- index.html +2 -2
index.html
CHANGED
@@ -421,8 +421,8 @@
|
|
421 |
<div class="column container formula">
|
422 |
<p>
|
423 |
Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
|
424 |
-
and the detection strategy. For an SSL model with a feature extractor
|
425 |
-
the classification branch can be formulated as
|
426 |
To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
|
427 |
</div>
|
428 |
</div>
|
|
|
421 |
<div class="column container formula">
|
422 |
<p>
|
423 |
Attackers can design adaptive attacks to try to bypass BEYOND when the attacker knows all the parameters of the model
|
424 |
+
and the detection strategy. For an SSL model with a feature extractor $f$, a projector `h`, and a classification head `g`,
|
425 |
+
the classification branch can be formulated as $\mathbb{C} = f\circ g$ and the representation branch as `\mathbb{R} = f\circ h`.
|
426 |
To attack effectively, the adversary must deceive the target model while guaranteeing the label consistency and representation similarity of the SSL model.
|
427 |
</div>
|
428 |
</div>
|