Login / Signup
Generating Targeted Adversarial Attacks and Assessing their Effectiveness in Fooling Deep Neural Networks.
Shivangi Gajjar
Avik Hati
Shruti Bhilare
Srimanta Mandal
Published in:
SPCOM (2022)
Keyphrases
</>
neural network
pattern recognition
signal processing
real time
decision trees
feed forward
neural nets
watermarking scheme
traffic analysis
genetic algorithm
fault diagnosis
security mechanisms
computer security