Login / Signup
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers.
Stefanos Koffas
Jing Xu
Mauro Conti
Stjepan Picek
Published in:
WiseML@WiSec (2022)
Keyphrases
</>
countermeasures
watermarking scheme
traffic analysis
data sets
watermarking algorithm
active databases
cryptographic protocols
security threats
denial of service attacks
website
feature extraction
special case
security protocols
malicious attacks
attack detection
security vulnerabilities