Login / Signup
A Wearables-Driven Attack on Examination Proctoring.
Tasnia Heya Ashrafi
Abdul Serwadda
Isaac Griswold-Steiner
Richard Matovu
Published in:
CoRR (2022)
Keyphrases
</>
data driven
countermeasures
computer vision
attack detection
image processing
digital watermark
data corruption
neural network
information systems
website
video sequences
secret key