• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Attack as defense: characterizing adversarial examples using robustness.

Zhe ZhaoGuangke ChenJingyi WangYiwei YangFu SongJun Sun
Published in: ISSTA (2021)
Keyphrases
  • ddos attacks
  • databases
  • malicious attacks
  • computational efficiency
  • network security
  • real time
  • neural network
  • artificial intelligence
  • feature selection
  • multi agent
  • data corruption