Defending Adversarial Attacks by Correcting logits.
Yifeng LiLingxi XieYa ZhangRui ZhangYanfeng WangQi TianPublished in: CoRR (2019)
Keyphrases
- ddos attacks
- countermeasures
- dos attacks
- multi agent
- watermarking scheme
- denial of service attacks
- malicious attacks
- security risks
- digital image watermarking
- stream cipher
- traffic analysis
- cryptographic protocols
- neural network
- security flaws
- detect malicious
- differential power analysis
- chosen plaintext
- watermarking method
- data publishing
- computer security
- text mining