shaguftausman07 shaguftausman07 23-11-2022 Computers and Technology contestada successful adversarial attacks mostly depend on knowledge of the algorithms used by the target ai. in an attempt to keep an algorithm secret, which method does an engineer use when hiding the secret?