Second-Order Provable Defenses against Adversarial Attacks.
Sahil SinglaSoheil FeiziPublished in: ICML (2020)
Keyphrases
- denial of service attacks
- dos attacks
- denial of service
- network security
- traffic analysis
- higher order
- countermeasures
- malicious users
- terrorist attacks
- malicious attacks
- ddos attacks
- security risks
- spam filters
- multi agent
- security mechanisms
- watermarking algorithm
- high order
- lightweight
- security protocols
- security threats
- watermarking scheme
- attack detection
- cooperative
- digital watermarking
- computer security
- cryptographic protocols
- machine learning systems
- security issues
- hessian matrix