Login / Signup
Linear System Identification-Oriented Optimal Tampering Attack Strategy and Implementation Based on Information Entropy with Multiple Binary Observations.
Zhongwei Bai
Peng Yu
Yan Liu
Jin Guo
Published in:
Algorithms (2024)
Keyphrases
</>
information entropy
rough sets
closed form
optimal strategy
input output
rough set theory
computer vision
data mining
multi class
dimensionality reduction
decision table
authentication scheme
forensic analysis
attribute reduction algorithm