Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks.
Marissa DotterSherry XieKeith ManvilleJosh HarguessColin BushoMikel RodriguezPublished in: CoRR (2021)
Keyphrases
- countermeasures
- attack detection
- maximum likelihood
- data corruption
- malicious users
- malicious attacks
- multi agent
- signal processing
- differential power analysis
- fault injection
- denial of service attacks
- network intrusion
- ddos attacks
- power analysis
- information leakage
- digital images
- network anomaly detection
- data mining