Login / Signup
Should Adversarial Attacks Use Pixel p-Norm?
Ayon Sen
Xiaojin Zhu
Liam Marshall
Robert D. Nowak
Published in:
CoRR (2019)
Keyphrases
</>
image pixels
countermeasures
input image
watermarking scheme
traffic analysis
multi agent
malicious attacks
chosen plaintext
image sequences
neighboring pixels
attack detection
pixel values
nonnegative matrix factorization
computer security
intensity values
security protocols