Algorithm Substitution Attacks from a Steganographic Perspective.
Sebastian BerndtMaciej LiskiewiczPublished in: CCS (2017)
Keyphrases
- experimental evaluation
- detection algorithm
- search space
- cost function
- similarity measure
- high accuracy
- computational cost
- computational complexity
- dynamic programming
- segmentation algorithm
- optimization algorithm
- learning algorithm
- clustering method
- matching algorithm
- recognition algorithm
- np hard
- optimal solution
- objective function
- expectation maximization
- convergence rate
- security protocols