Using Undervolting as an on-Device Defense Against Adversarial Machine Learning Attacks.
Saikat MajumdarMohammad Hossein SamavatianKristin BarberRadu TeodorescuPublished in: HOST (2021)
Keyphrases
- machine learning
- ddos attacks
- defense mechanisms
- network security
- machine learning methods
- data mining
- machine learning algorithms
- traffic analysis
- computational intelligence
- information extraction
- pattern recognition
- decision trees
- computer networks
- computer virus
- network anomaly detection
- explanation based learning
- countermeasures
- learning systems
- supervised learning
- watermarking algorithm
- active learning
- learning algorithm
- computer science
- spam filters
- feature selection
- text classification
- knowledge acquisition
- reinforcement learning
- intrusion detection
- neural network
- inductive learning
- rfid tags
- data analysis
- information security
- computer vision
- learning problems