Blurring Fools the Network - Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring.
Chenchen ZhaoHao LiPublished in: CoRR (2020)
Keyphrases
- image restoration
- traffic analysis
- space variant
- security threats
- motion blur
- network structure
- network traffic
- countermeasures
- wireless sensor networks
- denial of service attacks
- network topologies
- network model
- maximum likelihood
- peer to peer
- edge detection
- image features
- blurred images
- network security
- multi agent
- network intrusion
- fault injection
- network attacks
- intrusion prevention