Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion.
Suman SouravBinbin ChenPublished in: CoRR (2022)
Keyphrases
- detecting malicious
- misuse detection
- intrusion detection and prevention
- detect malicious
- automatic detection
- intrusion detection
- automatically detecting
- detecting anomalous
- anomaly detection
- countermeasures
- sensor data
- detection algorithm
- intrusion detection system
- normal traffic
- network intrusion detection systems
- network attacks
- multi sensor
- sensor networks
- real time
- detection method
- sensor fusion
- robust detection
- network traffic
- malicious users
- detect anomalies
- malicious activities
- computer security
- information loss
- watermarking scheme
- chosen plaintext