Login / Signup
Differential attacks: using alternative operations.
Roberto Civino
Céline Blondeau
Massimiliano Sala
Published in:
Des. Codes Cryptogr. (2019)
Keyphrases
</>
watermarking scheme
countermeasures
database
neural network
cooperative
genetic algorithm
artificial intelligence
image processing
computer security
malicious attacks
security vulnerabilities
detecting malicious