On Certifying Non-Uniform Bounds against Adversarial Attacks.
Chen LiuRyota TomiokaVolkan CevherPublished in: ICML (2019)
Keyphrases
- lower bound
- upper bound
- countermeasures
- multi agent
- data sets
- malicious attacks
- lower and upper bounds
- worst case
- traffic analysis
- terrorist attacks
- malicious users
- signal processing
- watermarking scheme
- upper and lower bounds
- database systems
- security protocols
- generalization bounds
- security threats
- database
- attack detection