Login / Signup
Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations.
Ruochen Tai
Liyong Lin
Yuting Zhu
Rong Su
Published in:
CoRR (2021)
Keyphrases
</>
program synthesis
noisy observations
malicious attacks
three dimensional
terrorist networks
texture synthesis
information flow
information systems
genetic algorithm
data sets
feature selection
real time
database systems
wide range
data mining
neural network
databases