Login / Signup

Generating Targeted Adversarial Attacks and Assessing their Effectiveness in Fooling Deep Neural Networks.

Shivangi GajjarAvik HatiShruti BhilareSrimanta Mandal
Published in: SPCOM (2022)
Keyphrases
  • neural network
  • pattern recognition
  • signal processing
  • real time
  • decision trees
  • feed forward
  • neural nets
  • watermarking scheme
  • traffic analysis
  • genetic algorithm
  • fault diagnosis
  • security mechanisms
  • computer security