Defense-guided Transferable Adversarial Attacks.
Zifei ZhangKai QiaoJian ChenPublished in: CoRR (2020)
Keyphrases
- ddos attacks
- defense mechanisms
- countermeasures
- network security
- computer security
- malicious attacks
- attack detection
- watermarking scheme
- computer virus
- dos attacks
- intrusion detection
- intrusion detection system
- cyber attacks
- traffic analysis
- cyber defense
- detect malicious
- neural network
- data mining
- security threats
- security protocols
- computer networks
- buffer overflow
- web applications
- data sets