Mitigating Adversarial Attacks by Distributing Different Copies to Different Users.
Jiyi ZhangWesley Joon-Wie TannEe-Chien ChangPublished in: CoRR (2021)
Keyphrases
- user interface
- multiple users
- malicious users
- end users
- user requirements
- social media
- security risks
- user interaction
- user profiles
- website
- daily life
- domain experts
- injection attacks
- information leakage
- malicious attacks
- risk management
- user model
- user experience
- context aware
- information sources
- cloud computing
- collaborative filtering
- recommender systems
- multi agent