Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application.
Salah GhamiziMaxime CordyMike PapadakisYves Le TraonPublished in: ICCVW (2021)
Keyphrases
- countermeasures
- machine learning
- information security
- denial of service
- attack graphs
- dos attacks
- security risks
- buffer overflow
- security vulnerabilities
- attack graph
- power analysis
- attack scenarios
- denial of service attacks
- data corruption
- malicious attacks
- differential power analysis
- java card
- attack detection
- network security
- cyber attacks
- malicious users
- ddos attacks
- security measures
- phishing attacks
- data mining
- digital watermark
- intrusion detection
- spread spectrum
- fault injection
- data hiding
- network anomaly detection
- block cipher
- security issues
- penetration testing
- network intrusions