I'd expect a malicious adversarial example to be more like the ones discussed in Snow Crash or BLIT ( https://en.wikipedia.org/wiki/BLIT_(short_story) )
I'd expect a malicious adversarial example to be more like the ones discussed in Snow Crash or BLIT ( https://en.wikipedia.org/wiki/BLIT_(short_story) )