Hey, late comment here but I thought it would be worth noting that we do actually acknowledge vulnerability to white-box attacks in the original paper and ran experiments to demonstrate this in Figure 14 (Figure 15 in the current version).It’s nice to see more work on this, though.
Hey, late comment here but I thought it would be worth noting that we do actually acknowledge vulnerability to white-box attacks in the original paper and ran experiments to demonstrate this in Figure 14 (Figure 15 in the current version).
It’s nice to see more work on this, though.