Login / Signup

Attack as defense: characterizing adversarial examples using robustness.

Zhe ZhaoGuangke ChenJingyi WangYiwei YangFu SongJun Sun
Published in: ISSTA (2021)
Keyphrases
  • ddos attacks
  • databases
  • malicious attacks
  • computational efficiency
  • network security
  • real time
  • neural network
  • artificial intelligence
  • feature selection
  • multi agent
  • data corruption