Perturbation Analysis of Gradient-based Adversarial Attacks.
Utku OzbulakManvel GasparyanWesley De NeveArnout Van MessemPublished in: CoRR (2020)
Keyphrases
- countermeasures
- watermarking scheme
- multi agent
- malicious attacks
- computer security
- image watermarking
- security flaws
- java card
- data sets
- security mechanisms
- security protocols
- lightweight
- traffic analysis
- watermarking method
- denial of service attacks
- reinforcement learning
- terrorist attacks
- attack detection
- digital image watermarking
- genetic algorithm