Login / Signup
Improving behavior based authentication against adversarial attack using XAI.
Dong Qin
George T. Amariucai
Daji Qiao
Yong Guan
Published in:
CoRR (2024)
Keyphrases
</>
authentication mechanism
authentication protocol
multi agent
secret key
key distribution
biometric authentication
data encryption
encryption decryption
data sets
digital images
countermeasures
security requirements
power analysis