Login / Signup
Escaping Adversarial Attacks with Egyptian Mirrors.
Olga Saukh
Published in:
FedEdge@MobiCom (2023)
Keyphrases
</>
countermeasures
malicious attacks
watermarking scheme
high dynamic range imaging
multi agent
attack detection
single camera
field of view
computer security
security protocols
ddos attacks
security threats
traffic analysis
security mechanisms
particle swarm optimization
digital images
malicious users
social networks