Login / Signup
Overcoming Adversarial Attacks for Human-in-the-Loop Applications.
Ryan McCoppin
Marla Kennedy
Platon Lukyanenko
Sean Kennedy
Published in:
CoRR (2023)
Keyphrases
</>
human subjects
human interaction
countermeasures
information retrieval
learning algorithm
video sequences
computational models
security protocols
digital watermarking
malicious attacks