Composite Adversarial Attacks.
Xiaofeng MaoYuefeng ChenShuhui WangHang SuYuan HeHui XuePublished in: CoRR (2020)
Keyphrases
- countermeasures
- multi agent
- malicious users
- security risks
- security mechanisms
- traffic analysis
- security protocols
- chosen plaintext
- stream cipher
- attack detection
- terrorist attacks
- malicious attacks
- security threats
- image watermarking
- ddos attacks
- data sets
- computer security
- watermarking scheme
- computer networks
- database systems
- learning algorithm
- information retrieval
- neural network