Login / Signup

Transfer Adversarial Attacks through Approximate Computing.

Valentina CasolaSalvatore Della Torca
Published in: ARES (2024)
Keyphrases
  • countermeasures
  • knowledge transfer
  • security protocols
  • efficiently computing
  • digital images
  • efficient computation
  • exact solution
  • computer security
  • image watermarking