Login / Signup
Subversion in Practice: How to Efficiently Undermine Signatures.
Joonsang Baek
Willy Susilo
Jongkil Kim
Yang-Wai Chow
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
probability distribution
real time
data sets
neural network
real world
artificial intelligence
computer vision
case study
expert systems
evolutionary algorithm
multiresolution
probabilistic model
operating system
signature verification