Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks.
Mihir BellareJoseph JaegerDaniel KanePublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- preprocessing
- detection algorithm
- learning algorithm
- times faster
- experimental evaluation
- state variables
- high accuracy
- k means
- objective function
- cost function
- computational cost
- worst case
- computational complexity
- expectation maximization
- neural network
- matching algorithm
- optimization algorithm
- theoretical analysis
- computationally efficient
- linear programming
- state space
- data sets
- dynamic programming
- data structure
- np hard
- lower bound
- search space