Login / Signup
Understanding the vulnerability of skeleton-based Human Activity Recognition via black-box attack.
Yunfeng Diao
He Wang
Tianjia Shao
Yongliang Yang
Kun Zhou
David C. Hogg
Meng Wang
Published in:
Pattern Recognit. (2024)
Keyphrases
</>
black box
human activity recognition
activity recognition
human activities
white box
black boxes
test cases
action recognition
attack graphs
penetration testing
artificial intelligence
reinforcement learning
software engineering
attack graph
buffer overflow