Defending Against Adversarial Samples Without Security through Obscurity.
Wenbo GuoQinglong WangKaixuan ZhangAlexander G. Ororbia IISui HuangXue LiuC. Lee GilesLin LinXinyu XingPublished in: ICDM (2018)
Keyphrases
- information security
- security issues
- security problems
- intrusion detection
- access control
- statistical databases
- multi agent
- security requirements
- data sets
- security policies
- security vulnerabilities
- training set
- sensitive data
- key management
- ddos attacks
- high security
- security threats
- information assurance
- security level
- cyber attacks
- sample set
- sample points
- elliptic curve
- data security
- security protocols
- data samples
- wireless sensor networks
- data mining