Reverse engineering adversarial attacks with fingerprints from adversarial examples.
David Aaron NicholsonVincent EmanuelePublished in: CoRR (2023)
Keyphrases
- reverse engineering
- software engineering
- software maintenance
- object oriented
- malicious code
- dynamic analysis
- software evolution
- multi agent
- computer aided design
- gene regulatory networks
- conceptual schema
- legacy systems
- artificial intelligence
- countermeasures
- program understanding
- reverse engineer
- life cycle
- web applications
- software product
- multi agent systems