Login / Signup
Self Destructing Exploit Executions via Input Perturbation.
Yonghwi Kwon
Brendan Saltaformaggio
I Luk Kim
Kyu Hyung Lee
Xiangyu Zhang
Dongyan Xu
Published in:
NDSS (2017)
Keyphrases
</>
special case
user input
real time
databases
decision trees
data sets
knowledge base
multimedia
image sequences
multi agent
cooperative
search algorithm