Login / Signup
Transformation-Dependent Adversarial Attacks.
Yaoteng Tan
Zikui Cai
M. Salman Asif
Published in:
CoRR (2024)
Keyphrases
</>
countermeasures
linear transformation
real time
data sets
neural network
data mining
security threats
traffic analysis
attack detection
multi agent
intrusion detection
watermarking scheme
malicious attacks
terrorist attacks
malicious users