Research Article
Exploring Security Vulnerabilities of Deep Learning Models by Adversarial Attacks
Algorithm 1
The visual similar word replacement algorithm.
| Let English text data be presented as X= | | A neural network model M | | A dataset list consist of all the word in this dataset | | for each do: | | | | sort by to get keywords list | | for each in keywords list and in do: | | calculating | | for each find out by | | use replace | | is the adversarial example of |
|