How to choose your best allies for a transferable attack? | IEEE Conference Publication | IEEE Xplore