Abstract
I. INTRODUCTION
II. RELATED WORK
A. Adversarial Attacks
B. White Box Attack and Black Box Attack
C. Projected Gradient Descent Attack
D. Adversarial Accuracy
E. Sparse attack
III. METHODOLOGY
A. Generating L-infinity attack
B. Sparse attack in L-infinity
C. Pipeline
D. Sparsity check method
IV. DATASET DESCRIPTION
V. EXPERIMENTS
A. Comparison with Adversarial Accuracy
B. Sparsity with Various Epsilon
VI. CONCLUSIONS & FUTURE WORKS
REFERENCES