C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
Han Fang
Jiyi Zhang
Yupeng Qiu
Ke Xu
Chengfang Fang
Ee-Chien Chang
Published in:
CoRR (2023)
Keyphrases
</>
countermeasures
digital forensics
forensic analysis
computer forensics
information security
power analysis
cyber attacks
forensic science
real time
document analysis
computer security
database
image analysis
digital images
encryption algorithm