Login / Signup
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples.
Zhe Zhao
Guangke Chen
Tong Liu
Taishan Li
Fu Song
Jingyi Wang
Jun Sun
Published in:
ACM Trans. Softw. Eng. Methodol. (2024)
Keyphrases
</>
significant improvement
object recognition
computational cost
countermeasures
neural network
genetic algorithm
object detection
data mining techniques
empirical studies
anomaly detection
detection algorithm
qualitative and quantitative
secret key