Login / Signup

Overcoming Adversarial Attacks for Human-in-the-Loop Applications.

Ryan McCoppinMarla KennedyPlaton LukyanenkoSean Kennedy
Published in: CoRR (2023)
Keyphrases
  • human subjects
  • human interaction
  • countermeasures
  • information retrieval
  • learning algorithm
  • video sequences
  • computational models
  • security protocols
  • digital watermarking
  • malicious attacks