Abstract: Deep code models are vulnerable to adversarial attacks, making it possible for semantically identical inputs to trigger different responses. Current black-box attack methods typically ...
Ctrl + C/Ctrl + V Copy and paste selected nodes (without maintaining connections to outputs of unselected nodes) Ctrl + C/Ctrl + Shift + V Copy and paste selected nodes (maintaining connections from ...
Inspector: You can read and edit in the inspector for the layers, such as the name, position, bounds, color, and more. Canvas: You can see supported layers and a preview of what they would look like ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results