The Efficacy of Transformer-based Adversarial Attacks in Security Domains.
Kunyang LiKyle DomicoJean-Charles Noirot FerrandPatrick D. McDanielPublished in: MILCOM (2023)
Keyphrases
- security threats
- security mechanisms
- security problems
- security protocols
- security measures
- security breaches
- java card
- computer security
- security vulnerabilities
- cyber attacks
- security issues
- countermeasures
- fault injection
- cryptographic protocols
- denial of service attacks
- stream cipher
- insider attacks
- chosen plaintext
- fuzzy logic
- security flaws
- information security
- access control
- malicious attacks
- security requirements
- security risks
- network security
- information leakage
- malicious users
- security policies
- secure routing
- dos attacks
- fault diagnosis
- cryptographic algorithms
- buffer overflow
- security properties
- watermarking scheme
- biometric template
- intrusion detection
- key management
- attack detection
- identity theft
- smart card
- intrusion prevention
- security analysis