FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments.
Alesia ChernikovaAlina OpreaPublished in: ACM Trans. Priv. Secur. (2022)
Keyphrases
- neural network
- countermeasures
- fuzzy logic
- dynamic environments
- back propagation
- genetic algorithm
- pattern recognition
- malicious attacks
- computer security
- neural network model
- information security
- artificial neural networks
- database systems
- decision trees
- self organizing maps
- fault diagnosis
- feasible solution
- digital images
- neural nets
- multi layer
- training process
- network architecture
- rule extraction
- traffic analysis
- denial of service attacks