Login / Signup
An Empirical Evaluation of Perturbation-based Defenses.
Adam Dziedzic
Sanjay Krishnan
Published in:
CoRR (2020)
Keyphrases
</>
network security
data perturbation
perturbation method
data sets
empirical evaluation
real time
search algorithm
network layer