Login / Signup
Hidden Vulnerabilities in Cosine Similarity based Poisoning Defense.
Harsh Kasyap
Somanath Tripathy
Published in:
CISS (2022)
Keyphrases
</>
euclidean distance
intrusion detection
information security
network security
security issues
hidden information
security vulnerabilities
feature vectors
vector space
database
neural network
security mechanisms
advanced research projects agency
data corruption