SWAP: Exploiting Second-Ranked Logits for Adversarial Attacks on Time Series.
Chang George DongLiangwei Nathan ZhengWeitong ChenWei Emma ZhangLin YuePublished in: ICKG (2023)
Keyphrases
- countermeasures
- dynamic time warping
- multi agent
- graph cuts
- attack detection
- watermarking scheme
- terrorist attacks
- malicious attacks
- security mechanisms
- traffic analysis
- information systems
- malicious users
- security threats
- multivariate time series
- autoregressive
- information retrieval
- security protocols
- computer security
- watermarking algorithm
- stock market
- quasi periodic