Adversarial Attacks on Neural-Network-Based Soft Sensors: Directly Attack Output.
Xiangyin KongZhiqiang GePublished in: IEEE Trans. Ind. Informatics (2022)
Keyphrases
- countermeasures
- attack detection
- malicious attacks
- malicious users
- differential power analysis
- data corruption
- attack scenarios
- denial of service attacks
- security risks
- neural network
- cyber attacks
- ddos attacks
- injection attacks
- network intrusions
- power analysis
- fault injection
- block cipher
- security vulnerabilities
- data fusion
- dos attacks
- network intrusion
- real time
- sensor networks
- information leakage
- intrusion detection
- watermarking scheme
- digital watermark
- defense mechanisms
- phishing attacks
- detecting malicious
- malicious activities
- buffer overflow
- normal traffic
- network anomaly detection
- multi sensor
- detection mechanism
- security measures
- sensor data
- multi agent
- java card
- access control
- misuse detection
- information security
- security protocols
- security mechanisms