Sign in
RobArch: Designing Robust Architectures against Adversarial Attacks.
Sheng-Yun Peng
Weilin Xu
Cory Cornelius
Kevin Li
Rahul Duggal
Duen Horng Chau
Jason Martin
Published in:
CoRR (2023)
Keyphrases
</>
computationally efficient
digital image watermarking
image watermarking
robust estimation
database
data sets
information retrieval
case study
digital images
countermeasures
watermarking technique
geometric distortions
watermarking method
malicious attacks