Struggle with Adversarial Defense? Try Diffusion.
Yujie LiYanbin WangHaitao XuBin LiuJianguo SunZhenhao GuoWenrui MaPublished in: CoRR (2024)
Keyphrases
- anisotropic diffusion
- multi agent
- network security
- diffusion process
- advanced research projects agency
- diffusion models
- diffusion processes
- information diffusion
- intrusion detection
- real world
- diffusion model
- three dimensional
- expert systems
- information overload
- multiscale
- bayesian networks
- diffusion equation
- ddos attacks
- website
- e learning
- databases
- computer virus