Login / Signup

Identifying Attack-Specific Signatures in Adversarial Examples.

Hossein SouriPirazh KhorramshahiChun Pong LauMicah GoldblumRama Chellappa
Published in: ICASSP (2024)
Keyphrases
  • high level
  • genetic algorithm
  • learning algorithm
  • artificial intelligence
  • information systems
  • signature verification
  • data sets
  • databases
  • multiscale
  • data structure
  • training examples
  • signature recognition