Resisting Adversarial Attacks by k-Winners-Take-All.
Chang XiaoPeilin ZhongChangxi ZhengPublished in: CoRR (2019)
Keyphrases
- watermarking algorithm
- attack detection
- countermeasures
- malicious attacks
- digital image watermarking
- image watermarking
- traffic analysis
- terrorist attacks
- watermarking scheme
- security threats
- data corruption
- website
- security vulnerabilities
- java card
- security protocols
- signal processing
- denoising
- special case
- multiresolution
- cooperative