Login / Signup
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
Han Fang
Jiyi Zhang
Yupeng Qiu
Jiayang Liu
Ke Xu
Chengfang Fang
Ee-Chien Chang
Published in:
ICCV (2023)
Keyphrases
</>
countermeasures
digital forensics
computer forensics
forensic analysis
power analysis
information security
multi agent
security measures
document analysis
secret key
malicious attacks
anomaly detection
computer security
block cipher
law enforcement
counter terrorism
data mining