On the Efficacy of Metrics to Describe Adversarial Attacks.
Tommaso PuccettiTommaso ZoppiAndrea CeccarelliPublished in: CoRR (2023)
Keyphrases
- multi agent
- countermeasures
- malicious attacks
- traffic analysis
- chosen plaintext
- malicious users
- evaluation metrics
- watermarking scheme
- security threats
- security mechanisms
- watermarking algorithm
- detect malicious
- denial of service attacks
- security protocols
- computer security
- similarity metrics
- data sets
- software development
- web applications
- case study
- web services
- information systems
- neural network