Adversarial attacks against Fact Extraction and VERification.
James ThorneAndreas VlachosPublished in: CoRR (2019)
Keyphrases
- java card
- cryptographic protocols
- information extraction
- model checking
- countermeasures
- multi agent
- automatic extraction
- watermarking algorithm
- malicious attacks
- malicious users
- information retrieval
- terrorist attacks
- traffic analysis
- knowledge extraction
- image watermarking
- dos attacks
- automatically extracted
- attack detection
- anomaly detection