Login / Signup
Automatic Generation of Data-Oriented Exploits.
Hong Hu
Zheng Leong Chua
Sendroiu Adrian
Prateek Saxena
Zhenkai Liang
Published in:
USENIX Security Symposium (2015)
Keyphrases
</>
data sets
image data
high quality
data analysis
data processing
original data
data points
high dimensional data
noisy data
data distribution
synthetic data
historical data
application domains
spatial data
attribute values
domain experts
data mining techniques
xml documents
training data
multimedia
real world