Hi,
In the paper for this repo, in Table 3, FGSM, BIM and MIM are shown as both white box and transfer black-box attacks, producing different results.
Just wondering which scripts to run to replicate this? There seems to be multiple FGSM attacks available but only white-box BIM and MIM?
Thanks.