Transferable Availability Poisoning Attacks.
Yiyong LiuMichael BackesXiao ZhangPublished in: CoRR (2023)
Keyphrases
- countermeasures
- security mechanisms
- malicious attacks
- computational power
- malicious users
- denial of service attacks
- traffic analysis
- computer security
- security protocols
- security threats
- detect malicious
- real time
- terrorist attacks
- java card
- cyber attacks
- watermarking scheme
- computer systems
- digital images
- genetic algorithm
- data mining
- neural network