Adversarial Attacks and Defences Competition.
Alexey KurakinIan J. GoodfellowSamy BengioYinpeng DongFangzhou LiaoMing LiangTianyu PangJun ZhuXiaolin HuCihang XieJianyu WangZhishuai ZhangZhou RenAlan L. YuilleSangxia HuangYao ZhaoYuzhe ZhaoZhonglin HanJunjiajia LongYerkebulan BerdibekovTakuya AkibaSeiya TokuiMotoki AbePublished in: CoRR (2018)
Keyphrases
- countermeasures
- malicious users
- malicious attacks
- watermarking scheme
- security mechanisms
- security threats
- international competition
- denial of service attacks
- security protocols
- cooperative
- data mining
- traffic analysis
- attack detection
- stream cipher
- digital image watermarking
- neural network
- data sets
- multi agent
- terrorist attacks