Scaling up the Randomized Gradient-Free Adversarial Attack Reveals Overestimation of Robustness Using Established Attacks.
Francesco CroceJonas RauberMatthias HeinPublished in: Int. J. Comput. Vis. (2020)
Keyphrases
- countermeasures
- malicious users
- malicious attacks
- attack detection
- denial of service attacks
- power analysis
- differential power analysis
- digital image watermarking
- ddos attacks
- attack scenarios
- network intrusion
- cyber attacks
- network attacks
- block cipher
- security risks
- data corruption
- fault injection
- security measures
- digital watermark
- network anomaly detection
- injection attacks
- information security
- normal traffic
- image watermarking scheme
- intrusion detection
- network intrusions
- detecting malicious
- misuse detection
- smart card
- security vulnerabilities
- java card
- phishing attacks
- detect malicious
- semi fragile watermarking
- security threats
- geometric attacks
- s box
- attack graphs
- watermarking scheme
- defense mechanisms
- network security
- access control