Login / Signup
Man-in-the-Middle Attacks Through Re-Shaping I-Q Optical Constellations.
Marc Ruiz
Jaume Comellas
Luis Velasco
Published in:
OFC (2023)
Keyphrases
</>
countermeasures
watermarking scheme
malicious attacks
solid state
java card
reward shaping
data corruption
malicious users
optical properties
optical imaging
terrorist attacks
fiber optic
data sets
cyber attacks
computer security
data mining
neural network