Adversarial Defense Through Network Profiling Based Path Extraction.
Yuxian QiuJingwen LengCong GuoQuan ChenChao LiMinyi GuoYuhao ZhuPublished in: CVPR (2019)
Keyphrases
- multiple paths
- path selection
- network traffic
- computer networks
- communication networks
- wireless sensor networks
- distributed network
- shortest path
- complex networks
- network model
- network architecture
- data flow
- path length
- network security
- network topologies
- ddos attacks
- network design
- database
- network structure
- information extraction
- multi agent
- real time