Sign in

Attack Hypothesis Generation.

Aviad ElitzurRami PuzisPolina Zilberman
Published in: EISIC (2019)
Keyphrases
  • generation algorithm
  • image processing
  • secret key
  • generation process
  • real world
  • image sequences
  • countermeasures
  • malicious attacks