Towards Transferable Adversarial Attacks with Centralized Perturbation.
Shangbo WuYu-an TanYajie WangRuinan MaWencong MaYuanzhang LiPublished in: CoRR (2023)
Keyphrases
- countermeasures
- peer to peer
- distributed environment
- malicious attacks
- watermarking scheme
- perturbation method
- security protocols
- multi agent
- peer to peer systems
- security threats
- denial of service attacks
- traffic analysis
- distributed information retrieval
- data corruption
- attack detection
- detect malicious
- web services
- security risks
- data publishing
- image watermarking
- security mechanisms
- watermarking algorithm
- network security
- database systems