Towards Transferable Adversarial Attacks with Centralized Perturbation.
Shangbo WuYu-an TanYajie WangRuinan MaWencong MaYuanzhang LiPublished in: AAAI (2024)
Keyphrases
- countermeasures
- peer to peer
- malicious attacks
- distributed environment
- multi agent
- malicious users
- digital watermarking
- denial of service attacks
- image watermarking
- traffic analysis
- detecting malicious
- security threats
- distributed information retrieval
- chosen plaintext
- detect malicious
- perturbation method
- attack detection
- security protocols
- watermarking scheme
- digital images