Research Article

Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks

Algorithm 1

The visual similar word replacement algorithm.
Let English text data be presented as X=
A neural network model M
A dataset list consist of all the word in this dataset
for each do:
sort by to get keywords list
for each in keywords list and in do:
 calculating
 for each find out by
use replace
is the adversarial example of