Login / Signup
How to detect unauthorised usage of a key.
Jiangshan Yu
Mark Ryan
Cas Cremers
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
detection method
multiscale
reinforcement learning
detection algorithm
neural network
genetic algorithm
website
image sequences
similarity measure
trade off
management system
web usage