Login / Signup
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
Han Fang
Jiyi Zhang
Yupeng Qiu
Ke Xu
Chengfang Fang
Ee-Chien Chang
Published in:
CoRR (2023)
Keyphrases
</>
countermeasures
digital forensics
forensic analysis
computer forensics
information security
power analysis
cyber attacks
forensic science
real time
document analysis
computer security
database
image analysis
digital images
encryption algorithm