Second-Order Provable Defenses against Adversarial Attacks.
Sahil SinglaSoheil FeiziPublished in: CoRR (2020)
Keyphrases
- denial of service attacks
- denial of service
- dos attacks
- countermeasures
- higher order
- network security
- multi agent
- traffic analysis
- watermarking scheme
- malicious attacks
- ddos attacks
- spam filters
- chosen plaintext
- security threats
- spam filtering
- high order
- machine learning systems
- cyber attacks
- hessian matrix
- security mechanisms
- malicious users
- detect malicious
- lower bound