Adversarial Attacks on Tables with Entity Swap.
Aneta KolevaMartin RingsquandlVolker TrespPublished in: CoRR (2023)
Keyphrases
- database
- countermeasures
- multi agent
- graph cuts
- databases
- malicious attacks
- knowledge base
- chosen plaintext
- entity identification
- data sets
- database tables
- terrorist attacks
- traffic analysis
- computer security
- entity ranking
- security protocols
- malicious users
- watermarking scheme
- image watermarking
- cryptographic protocols
- security threats
- database objects
- data publishing
- denial of service attacks
- named entities
- relational databases