Network Traffic Obfuscation against Traffic Classification
Algorithm 2
Improved MIM using method 1.
Input: classifier f; loss function J; original sample x; authentic label y; disturbance size α; fixed number of iterations n; number of iterations T; attenuation factor μ.