This is an attack that identifies model prediction failures, and then present related content as inputs to influence its decisions. Techniques FGSM Jacobian-based Saliency Map Attack Feature Space Manipulation Decision Boundary Attacks Examples Polkadots Against Computer Vision