Login / Signup
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers.
Stefanos Koffas
Jing Xu
Mauro Conti
Stjepan Picek
Published in:
CoRR (2021)
Keyphrases
</>
countermeasures
malicious attacks
watermarking scheme
security mechanisms
malicious users
operating system
security protocols
cyber attacks
security threats
terrorist attacks
attack detection
data corruption
chosen plaintext