On Certifying Non-uniform Bound against Adversarial Attacks.
Chen LiuRyota TomiokaVolkan CevherPublished in: CoRR (2019)
Keyphrases
- upper bound
- countermeasures
- lower bound
- worst case
- malicious attacks
- security threats
- security protocols
- computer security
- data mining
- data corruption
- denial of service attacks
- security risks
- dos attacks
- multi agent
- watermarking technique
- watermarking scheme
- information security
- digital images
- information systems
- terrorist attacks
- attack detection
- security vulnerabilities
- malicious users
- neural network
- attack scenarios
- secure routing