Login / Signup
Transfer Adversarial Attacks through Approximate Computing.
Valentina Casola
Salvatore Della Torca
Published in:
ARES (2024)
Keyphrases
</>
countermeasures
knowledge transfer
security protocols
efficiently computing
digital images
efficient computation
exact solution
computer security
image watermarking