Login / Signup
Exploitation Techniques and Defenses for Data-Oriented Attacks.
Long Cheng
Hans Liljestrand
Thomas Nyman
Yu Tsung Lee
Danfeng Yao
Trent Jaeger
N. Asokan
Published in:
CoRR (2019)
Keyphrases
</>
data sets
database
training data
small number
raw data
experimental data
synthetic data
data collection
xml documents
data analysis
spatial data
high quality
databases
data quality
probability distribution
data processing
relational databases
multimedia data
original data