Login / Signup
Adversarial Imitation Attack.
Mingyi Zhou
Jing Wu
Yipeng Liu
Xiaolin Huang
Shuaicheng Liu
Xiang Zhang
Ce Zhu
Published in:
CoRR (2020)
Keyphrases
</>
countermeasures
multi agent
reinforcement learning
malicious attacks
databases
computational model
secret key
detection mechanism
decision trees
case study
imitation learning
power analysis