“…Adversarial attack methods can be categorized into two main settings, i.e., white-box attack [2,5,17,21,24] and black-box attack [3,3,4,6,7,12,13,35], by whether or not the attackers can have full access to the structure and parameters of the target model. Nowadays, in the era of big data, data is one of the most valuable assets for companies, and much of it also has privacy issues.…”