Sign in

SPA: Stealthy Poisoning Attack.

Jinyin ChenLongyuan ZhangHaibin ZhengQi Xuan
Published in: CIAT (2020)
Keyphrases
  • countermeasures
  • detection mechanism
  • real time
  • information retrieval
  • learning algorithm
  • malicious attacks
  • attack graph
  • malicious users
  • attack graphs