Login / Signup
Second-order Scatter Attack.
Hugues Thiebeauld
Aurélien Vasselle
Antoine Wurcker
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
higher order
countermeasures
real time
neural network
high order
hessian matrix
database
attack detection
directional derivatives
malicious users
abstract argumentation
digital watermark
detection mechanism
dos attacks
ddos attacks
secret key
similarity measure
databases