Mitigating Adversarial Attacks using Pruning.
Vipul Kumar MishraAditya VarshneyShekhar YadavPublished in: IC3 (2023)
Keyphrases
- pruning algorithms
- countermeasures
- pruning method
- search space
- malicious attacks
- traffic analysis
- watermarking scheme
- multi agent
- computer security
- security threats
- data sets
- tree pruning
- watermarking technique
- security protocols
- risk management
- decision support system
- data corruption
- effective pruning
- watermarking algorithm
- pruning methods
- denial of service attacks
- attack detection
- malicious users
- digital image watermarking