Login / Signup
Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks.
Jiangnan Li
Yingyuan Yang
Jinyuan Stella Sun
Published in:
CoRR (2020)
Keyphrases
</>
deep learning
countermeasures
information security
unsupervised learning
unsupervised feature learning
security vulnerabilities
security risks
machine learning
object detection
identity theft
email
security mechanisms
insider threat
buffer overflow
data mining
anomaly detection