Login / Signup
Identifying Attack-Specific Signatures in Adversarial Examples.
Hossein Souri
Pirazh Khorramshahi
Chun Pong Lau
Micah Goldblum
Rama Chellappa
Published in:
ICASSP (2024)
Keyphrases
</>
high level
genetic algorithm
learning algorithm
artificial intelligence
information systems
signature verification
data sets
databases
multiscale
data structure
training examples
signature recognition