Login / Signup
Black-box adversarial attack via overlapped shapes.
Phoenix Neale Williams
Ke Li
Geyong Min
Published in:
GECCO Companion (2022)
Keyphrases
</>
black box
black boxes
shape analysis
white box
rule extraction
hybrid systems
integration testing
test cases
shape model
shape descriptors
shape representation
artificial intelligence
ddos attacks
multi agent
databases
countermeasures
shape matching
monitoring system
software systems
case study
white box testing