Login / Signup
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly.
Qizhang Li
Yiwen Guo
Wangmeng Zuo
Hao Chen
Published in:
NeurIPS (2023)
Keyphrases
</>
countermeasures
knowledge transfer
transfer learning
traffic analysis
denial of service attacks
decision trees
cooperative
watermarking scheme
security protocols
security risks
terrorist attacks
malicious users