Demystifying Self-supervised Trojan Attacks.
Changjiang LiRen PangZhaohan XiTianyu DuShouling JiYuan YaoTing WangPublished in: CoRR (2022)
Keyphrases
- countermeasures
- computer security
- security protocols
- malicious attacks
- security problems
- watermarking scheme
- cyber attacks
- security threats
- traffic analysis
- malicious code
- attack detection
- image watermarking
- denial of service attacks
- digital image watermarking
- database
- malicious users
- cyber security
- static analysis
- digital images
- case study
- real time