Maximal Brain Damage Without Data or Optimization: Disrupting Neural Networks via Sign-Bit Flips
Pith reviewed 2026-05-23 03:27 UTC · model grok-4.3
The pith
Flipping two sign bits in ResNet-50 drops ImageNet accuracy by 99.8 percent via a data-free procedure.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The authors claim that their data-free and optimization-free Deep Neural Lesion procedure, along with its single-pass variant, can locate a minimal set of sign bits whose flip produces maximal damage, with concrete cases including a 99.8 percent accuracy drop for ResNet-50 on ImageNet from two flips, collapse of COCO detection and mask AP from one or two flips in Mask R-CNN and YOLOv8-seg, and reduction of Qwen3-30B-A3B-Thinking accuracy from 78 percent to zero from two flips into different experts; they further claim that protecting a small fraction of these bits constitutes a practical defense.
What carries the argument
Deep Neural Lesion (DNL), a search that ranks sign bits by their potential to disrupt network output when flipped, refined by 1P-DNL with one forward-backward pass on random inputs.
If this is right
- Two sign-bit flips suffice to reduce ResNet-50 ImageNet accuracy by 99.8 percent.
- One or two sign flips collapse COCO detection and mask AP in Mask R-CNN and YOLOv8-seg.
- Two sign flips into different experts reduce a 30B-parameter mixture-of-experts model accuracy to zero.
- Protecting a small fraction of the identified vulnerable sign bits defends against the described attacks.
Where Pith is reading between the lines
- The results suggest that sign bits carry more functional importance than their magnitude bits in these networks.
- Hardware or quantized deployments might require bit-level isolation for the identified parameters to prevent low-cost disruption.
- The same search could be applied to locate minimal flips that induce other specific failure modes such as targeted misclassification.
- Extending the method to non-sign bits or to activation functions might reveal additional single-location failure points.
Load-bearing premise
The procedure can locate the sign bits that cause the largest possible damage without depending on model-specific structure that is not stated in the method.
What would settle it
A test on one of the reported architectures where the bits identified by DNL or 1P-DNL are flipped yet the accuracy or AP remains close to the original value.
Figures
read the original abstract
Deep Neural Networks (DNNs) can be catastrophically disrupted by flipping only a handful of parameter bits. We introduce Deep Neural Lesion (DNL), a data-free and optimizationfree method that locates critical parameters, and an enhanced single-pass variant, 1P-DNL, that refines this selection with one forward and backward pass on random inputs. We show that this vulnerability spans multiple domains, including image classification, object detection, instance segmentation, and reasoning large language models. In image classification, flipping just two sign bits in ResNet-50 on ImageNet reduces accuracy by 99.8%. In object detection and instance segmentation, one or two sign flips in the backbone collapse COCO detection and mask AP for Mask R-CNN and YOLOv8-seg models. In language modeling, two sign flips into different experts reduce Qwen3-30B-A3B-Thinking from 78% to 0% accuracy. We also show that selectively protecting a small fraction of vulnerable sign bits provides a practical defense against such attacks.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces Deep Neural Lesion (DNL), a data-free and optimization-free procedure, along with its single-pass refinement 1P-DNL, for identifying a small number of critical sign bits in DNN parameters. It claims that flipping one or two such bits produces near-total performance collapse across tasks: 99.8% accuracy drop on ResNet-50/ImageNet, collapse of COCO AP/mask AP on Mask R-CNN and YOLOv8-seg, and reduction of Qwen3-30B-A3B-Thinking accuracy from 78% to 0%. A defense is proposed by selectively protecting the identified vulnerable bits.
Significance. If the central claims hold, the work demonstrates an extreme, previously under-appreciated form of bit-flip vulnerability that requires neither training data nor iterative optimization, with potential consequences for hardware-level security and model deployment across vision and language domains. The cross-task scope and the proposed defense are notable if the selection procedure is shown to be reliable.
major comments (3)
- [Method section (DNL/1P-DNL definition)] DNL and 1P-DNL method description: the core claim that these procedures locate near-maximally damaging sign bits without data or optimization rests on an unspecified scoring rule (gradient magnitude on random inputs, activation statistics, or similar). Without the precise criterion and a demonstration that it outperforms random selection or exhaustive search on the tested models, the headline quantitative results cannot be verified as arising from the method rather than model-specific structure.
- [Experiments and results sections] Experimental results on ResNet-50, Mask R-CNN, YOLOv8, and Qwen3-30B: the reported collapses (two flips → 99.8% drop; one/two flips → AP collapse; two expert flips → 0%) are presented without controls such as performance under random sign flips, comparison to gradient-based or optimization-based bit selection, or statistical reporting across multiple random seeds. This leaves open whether DNL/1P-DNL is required or whether the vulnerability is simply ubiquitous.
- [LLM experiments subsection] Qwen3-30B-A3B-Thinking results: the claim of generalization to reasoning LLMs depends on the two flipped bits landing in different experts. The manuscript must clarify whether the DNL scoring rule exploits MoE routing statistics or activation patterns that are architecture-specific, as this would limit the data-free, optimization-free claim.
minor comments (2)
- Notation for sign-bit indexing and the precise definition of a 'flip' should be made consistent between the method and all result tables.
- The defense section should report the overhead (number of bits protected, impact on clean accuracy) for the proposed protection scheme.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback. We address each major comment below with clarifications and commit to revisions that strengthen the presentation of the method and results without altering the core claims.
read point-by-point responses
-
Referee: [Method section (DNL/1P-DNL definition)] DNL and 1P-DNL method description: the core claim that these procedures locate near-maximally damaging sign bits without data or optimization rests on an unspecified scoring rule (gradient magnitude on random inputs, activation statistics, or similar). Without the precise criterion and a demonstration that it outperforms random selection or exhaustive search on the tested models, the headline quantitative results cannot be verified as arising from the method rather than model-specific structure.
Authors: The 1P-DNL procedure computes scores via gradient magnitudes obtained from a single forward-backward pass on random inputs, while the base DNL uses a data-free heuristic based on activation statistics. We agree the exact scoring formula was insufficiently detailed. In revision we will add the precise mathematical criterion for bit ranking in both variants and include a direct comparison demonstrating that DNL/1P-DNL outperforms random selection on the evaluated models. revision: yes
-
Referee: [Experiments and results sections] Experimental results on ResNet-50, Mask R-CNN, YOLOv8, and Qwen3-30B: the reported collapses (two flips → 99.8% drop; one/two flips → AP collapse; two expert flips → 0%) are presented without controls such as performance under random sign flips, comparison to gradient-based or optimization-based bit selection, or statistical reporting across multiple random seeds. This leaves open whether DNL/1P-DNL is required or whether the vulnerability is simply ubiquitous.
Authors: The experiments emphasize the extreme vulnerability found by the method. We acknowledge that explicit random-flip baselines, comparisons to other selection strategies, and multi-seed statistics would better isolate the method's contribution. We will add these controls and statistical reporting in the revised experiments section. revision: yes
-
Referee: [LLM experiments subsection] Qwen3-30B-A3B-Thinking results: the claim of generalization to reasoning LLMs depends on the two flipped bits landing in different experts. The manuscript must clarify whether the DNL scoring rule exploits MoE routing statistics or activation patterns that are architecture-specific, as this would limit the data-free, optimization-free claim.
Authors: DNL and 1P-DNL apply an identical general scoring rule to all models, including the MoE-based Qwen3, without incorporating routing statistics or other MoE-specific information. The observation that the selected bits resided in different experts is a post-selection result, not an input to the scoring procedure. We will insert an explicit statement in the LLM subsection confirming that the method remains architecture-agnostic. revision: yes
Circularity Check
No significant circularity; empirical demonstration only
full rationale
The paper introduces DNL and 1P-DNL as heuristic search procedures and validates them solely via direct experiments on ResNet-50, Mask R-CNN, YOLOv8, and Qwen3-30B. No equations, uniqueness theorems, or first-principles derivations appear; the central claims are measured accuracy drops after bit flips, not predictions that reduce to fitted inputs or self-definitions. No self-citation chains, ansatzes, or renamings of known results are load-bearing. The work is therefore self-contained as an empirical attack study.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Neural network performance depends critically on the sign of a small subset of parameters
invented entities (1)
-
Deep Neural Lesion (DNL) and 1P-DNL
no independent evidence
Reference graph
Works this paper leans on
-
[1]
Food-101 – mining discriminative components with random forests
Lukas Bossard, Matthieu Guillaumin, and Luc Van Gool. Food-101 – mining discriminative components with random forests. In European Conference on Computer Vision, 2014
work page 2014
-
[2]
Towards evaluating the robustness of neural networks, 2016
Nicholas Carlini and David Wagner. Towards evaluating the robustness of neural networks, 2016
work page 2016
- [3]
-
[4]
An image is worth 16x16 words: Transformers for image recognition at scale, 2020
Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, Jakob Uszkoreit, and Neil Houlsby. An image is worth 16x16 words: Transformers for image recognition at scale, 2020
work page 2020
-
[5]
David C. Van Essen, Charles H. Anderson, and Daniel J. Felleman. Information processing in the primate visual system: An integrated systems perspective. Science, 255(5043):419–423, 1992. doi: 10.1126/science.1734518. URL https://www.science.org/doi/abs/10.1126/science.1734518
-
[6]
The lottery ticket hypothesis: Finding sparse, trainable neural networks, 2018
Jonathan Frankle and Michael Carbin. The lottery ticket hypothesis: Finding sparse, trainable neural networks, 2018
work page 2018
-
[7]
Grand pwning unit: Accelerating microarchi- tectural attacks with the gpu
Pietro Frigo, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. Grand pwning unit: Accelerating microarchi- tectural attacks with the gpu. In 2018 IEEE Symposium on Security and Privacy (SP), pages 195–210, 2018. doi: 10.1109/SP.2018.00022
-
[8]
Bdfa: A blind data adversarial bit-flip attack on deep neural networks, 2021
Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh, Zhenman Fang, and Lesley Shannon. Bdfa: A blind data adversarial bit-flip attack on deep neural networks, 2021
work page 2021
-
[9]
Explaining and Harnessing Adversarial Examples
Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. In Yoshua Bengio and Yann LeCun, editors,3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, 2015. URL http://arxiv.org/abs/ 1412.6572
work page internal anchor Pith review Pith/arXiv arXiv 2015
-
[10]
Second order derivatives for network pruning: Optimal brain surgeon
Hassibi, Babak, Stork, and David. Second order derivatives for network pruning: Optimal brain surgeon. In Advances in Neural Information Processing Systems, 1992. URL https://proceedings.neurips.cc/paper_ files/paper/1992/file/303ed4c69846ab36c2904d3ba8573050-Paper.pdf
work page 1992
-
[11]
Deep residual learning for image recognition, 2015
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition, 2015
work page 2015
-
[12]
Rootkits: Subverting the Windows Kernel
Greg Hoglund and Jamie Butler. Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, 2006. ISBN 978-0-321-29431-0
work page 2006
-
[13]
Sanghyun Hong, Pietro Frigo, Yi˘gitcan Kaya, Cristiano Giuffrida, and Tudor Dumitras ¸. Terminal brain damage: exposing the graceless degradation in deep neural networks under hardware fault attacks. In Proceedings of the 28th USENIX Conference on Security Symposium, SEC’19, page 497–514, USA, 2019. USENIX Association. ISBN 9781939133069
work page 2019
-
[14]
Andrew Howard, Mark Sandler, Grace Chu, Liang-Chieh Chen, Bo Chen, Mingxing Tan, Weijun Wang, Yukun Zhu, Ruoming Pang, Vijay Vasudevan, Quoc V . Le, and Hartwig Adam. Searching for mobilenetv3, 2019
work page 2019
-
[15]
Thunderstrike: Efi firmware bootkits for apple macbooks
Trammell Hudson and Larry Rudolph. Thunderstrike: Efi firmware bootkits for apple macbooks. In Proceedings of the 8th ACM International Systems and Storage Conference , SYSTOR ’15, New York, NY , USA, 2015. Association for Computing Machinery. ISBN 9781450336079. doi: 10.1145/2757667.2757673. URL https: //doi.org/10.1145/2757667.2757673. 11
-
[16]
E.R. Kandel, J.H. Schwartz, and T. Jessell. Principles of Neural Science, Fourth Edition . McGraw-Hill Companies,Incorporated, 2000. ISBN 9780838577011. URL https://books.google.co.il/books?id= yzEFK7Xc87YC
work page 2000
-
[18]
Flipping bits in memory without accessing them: An experimental study of dram disturbance errors
Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. Flipping bits in memory without accessing them: An experimental study of dram disturbance errors. In 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA), pages 361–372, 2014. doi: 10.1109/ISCA.2014.6853210
-
[19]
Fine-grained recognition without part annotations
Jonathan Krause, Hailin Jin, Jianchao Yang, and Li Fei-Fei. Fine-grained recognition without part annotations. In 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 5546–5555, 2015. doi: 10.1109/CVPR.2015.7299194
-
[20]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. Imagenet classification with deep convolutional neural networks. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 1, NIPS’12, page 1097–1105, Red Hook, NY , USA, 2012. Curran Associates Inc
work page 2012
-
[21]
Pat Langley. Placeholder title. Placeholder Journal, 1(1):1–10, 2000
work page 2000
-
[22]
Yann LeCun, John Denker, and Sara Solla. Optimal brain damage. In D. Touretzky, editor,Advances in Neural Information Processing Systems, volume 2. Morgan-Kaufmann, 1989. URL https://proceedings.neurips. cc/paper_files/paper/1989/file/6c9882bbac1c7093bd25041881277658-Paper.pdf
work page 1989
-
[23]
SNIP: SINGLE-SHOT NETWORK PRUNING BASED ON CONNECTION SENSITIVITY
Namhoon Lee, Thalaiyasingam Ajanthan, and Philip Torr. SNIP: SINGLE-SHOT NETWORK PRUNING BASED ON CONNECTION SENSITIVITY. In International Conference on Learning Representations, 2019
work page 2019
-
[24]
Nethammer: Inducing rowhammer faults through network requests
Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clementine Maurice, and Daniel Gruss. Nethammer: Inducing rowhammer faults through network requests. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroSSamp;PW) . IEEE, September 2020. doi: 10.1109/ eurospw51379.2020.00102. URL http://dx.doi.org/10.1109/Euro...
-
[25]
Zhuang Liu, Hanzi Mao, Chao-Yuan Wu, Christoph Feichtenhofer, Trevor Darrell, and Saining Xie. A convnet for the 2020s, 2022
work page 2022
-
[26]
Shufflenet v2: Practical guidelines for efficient cnn architecture design, 2018
Ningning Ma, Xiangyu Zhang, Hai-Tao Zheng, and Jian Sun. Shufflenet v2: Practical guidelines for efficient cnn architecture design, 2018
work page 2018
-
[27]
Towards deep learning models resistant to adversarial attacks
Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. Towards deep learning models resistant to adversarial attacks. In International Conference on Learning Representations, 2018
work page 2018
-
[28]
S. Maji, J. Kannala, E. Rahtu, M. Blaschko, and A. Vedaldi. Fine-grained visual classification of aircraft. Technical report, 2013
work page 2013
-
[29]
Torchvision the machine-vision package of torch
S´ebastien Marcel and Yann Rodriguez. Torchvision the machine-vision package of torch. In Proceedings of the 18th ACM International Conference on Multimedia , MM ’10, page 1485–1488, New York, NY , USA,
-
[30]
Association for Computing Machinery. ISBN 9781605589336. doi: 10.1145/1873951.1874254. URL https://doi.org/10.1145/1873951.1874254
-
[31]
Theodore Markettos, Colin Rothwell, Brett F
A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, and Robert N. M. Watson. Thunderclap: Exploring vulnerabilities in operating system iommu protection via dma from untrustworthy peripherals. Proceedings 2019 Network and Distributed System Security Symposium, 2019
work page 2019
-
[32]
Skeletonization: A technique for trimming the fat from a network via relevance assessment
Michael C Mozer and Paul Smolensky. Skeletonization: A technique for trimming the fat from a network via relevance assessment. In Advances in Neural Information Processing Systems . Morgan-Kaufmann, 1988. URL https://proceedings.neurips.cc/paper_files/paper/1988/file/ 07e1cd7dca89a1678042477183b7ac3f-Paper.pdf
work page 1988
-
[33]
Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens
Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. Plundervolt: Software-based fault injection attacks against intel sgx. In 2020 IEEE Symposium on Security and Privacy (SP), pages 1466–1482, 2020. doi: 10.1109/SP40000.2020.00057
-
[34]
CEH: Certified Ethical Hacker Version 8 Study Guide
Sean-Philip Oriyano. CEH: Certified Ethical Hacker Version 8 Study Guide. SYBEX Inc., USA, 1st edition, 2014. ISBN 111864767X
work page 2014
-
[35]
Zebra: Precisely destroying neural networks with zero-data based repeated bit flip attack, 2021
Dahoon Park, Kon-Woo Kwon, Sunghoon Im, and Jaeha Kung. Zebra: Precisely destroying neural networks with zero-data based repeated bit flip attack, 2021. 12
work page 2021
-
[36]
W. Wesley Peterson and E. J. Weldon. Error-Correcting Codes. MIT Press, Cambridge, MA, 2nd edition, 1972
work page 1972
-
[37]
Designing network design spaces
Ilija Radosavovic, Raj Prateek Kosaraju, Ross Girshick, Kaiming He, and Piotr Dollar. Designing network design spaces. In 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, June 2020. doi: 10.1109/cvpr42600.2020.01044. URL http://dx.doi.org/10.1109/cvpr42600.2020.01044
-
[38]
Designing network design spaces, 2020
Ilija Radosavovic, Raj Prateek Kosaraju, Ross Girshick, Kaiming He, and Piotr Doll´ar. Designing network design spaces, 2020
work page 2020
-
[39]
Bit-flip attack: Crushing neural network with progressive bit search
Adnan Siraj Rakin, Zhezhi He, and Deliang Fan. Bit-flip attack: Crushing neural network with progressive bit search. In 2019 IEEE/CVF International Conference on Computer Vision (ICCV), page 1211–1220. IEEE, October 2019. doi: 10.1109/iccv.2019.00130. URL http://dx.doi.org/10.1109/ICCV.2019.00130
-
[40]
Beyond the CPU: Defeating hardware-based RAM acquisition
Joanna Rutkowska. Beyond the CPU: Defeating hardware-based RAM acquisition. Black Hat USA, 2007
work page 2007
-
[41]
Exploiting the dram rowhammer bug to gain kernel privi- leges
Mark Seaborn and Thomas Dullien. Exploiting the dram rowhammer bug to gain kernel privi- leges. Black Hat USA, August 2015. URL https://googleprojectzero.blogspot.com/2015/03/ exploiting-dram-rowhammer-bug-to-gain.html
work page 2015
-
[42]
Shadow walker: Raising the bar for rootkit detection
Sherri Sparks and Jamie Butler. Shadow walker: Raising the bar for rootkit detection. In Black Hat Federal, 2005
work page 2005
-
[43]
Emma E. M. Stewart, Matteo Valsecchi, and Alexander C. Sch¨utz. A review of interactions between peripheral and foveal vision. Journal of Vision, 20, 2020
work page 2020
-
[44]
Mingxing Tan and Quoc V . Le. Efficientnet: Rethinking model scaling for convolutional neural networks, 2019
work page 2019
-
[45]
Pruning neural networks without any data by iteratively conserving synaptic flow
Hidenori Tanaka, Daniel Kunin, Daniel L Yamins, and Surya Ganguli. Pruning neural networks without any data by iteratively conserving synaptic flow. In H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin, editors, Advances in Neural Information Processing Systems, volume 33, pages 6377–6389. Cur- ran Associates, Inc., 2020. URL https://proceedi...
work page 2020
-
[46]
CLKSCREW: Exposing the perils of Security- Oblivious energy management
Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo. CLKSCREW: Exposing the perils of Security- Oblivious energy management. In 26th USENIX Security Symposium (USENIX Security 17), pages 1057–1074, Vancouver, BC, August 2017. USENIX Association. ISBN 978-1-931971-40-9. URL https://www.usenix. org/conference/usenixsecurity17/technical-sessions/presentation/tang
work page 2017
-
[47]
Throwhammer: Rowhammer attacks over the network and defenses
Andrei Tatar, Radhesh Krishnan Konoth, Elias Athanasopoulos, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. Throwhammer: Rowhammer attacks over the network and defenses. In 2018 USENIX Annual Technical Conference (USENIX ATC 18), pages 213–226, Boston, MA, July 2018. USENIX Association. ISBN ISBN 978-1-939133-01-4. URL https://www.usenix.org/conferen...
work page 2018
-
[48]
TRRespass: Exploiting the rowhammer bug in TRR- protected DRAM
Victor Van der Veen, Cristiano Giuffrida, and Others. TRRespass: Exploiting the rowhammer bug in TRR- protected DRAM. In IEEE Symposium on Security and Privacy, 2020
work page 2020
-
[49]
Picking winning tickets before training by preserving gradient flow
Chaoqi Wang, Guodong Zhang, and Roger Grosse. Picking winning tickets before training by preserving gradient flow. InInternational Conference on Learning Representations, 2020. URL https://openreview.net/forum? id=SkgsACVKPH
work page 2020
-
[50]
Adversarial sticker: A stealthy attack method in the physical world
Xingxing Wei, Ying Guo, and Jie Yu. Adversarial sticker: A stealthy attack method in the physical world. IEEE Transactions on Pattern Analysis and Machine Intelligence , page 1–1, 2022. ISSN 1939-3539. doi: 10.1109/tpami.2022.3176760. URL http://dx.doi.org/10.1109/TPAMI.2022.3176760
-
[51]
Ross Wightman. Pytorch image models. https://github.com/rwightman/pytorch-image-models, 2019
work page 2019
-
[52]
DeepHammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips
Fan Yao, Adnan Siraj Rakin, and Deliang Fan. DeepHammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips. In 29th USENIX Security Symposium (USENIX Security 20), pages 1463–1480. USENIX Association, August 2020. ISBN 978-1-939133-17-5. URLhttps://www.usenix.org/conference/ usenixsecurity20/presentation/yao
work page 2020
-
[53]
Matthew D. Zeiler and Rob Fergus. Visualizing and Understanding Convolutional Networks, page 818–833. Springer International Publishing, 2014. ISBN 9783319105901. doi: 10.1007/978-3-319-10590-1 53. URL http://dx.doi.org/10.1007/978-3-319-10590-1_53 . 13 A Compare to Bit Flip Attacks Following Section 6, Table 3 compares bit-flip attacks on ImageNet1K and ...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.