Login / Signup
Poster: Backdoor Attack on Extreme Learning Machines.
Behrad Tajalli
Gorka Abad
Stjepan Picek
Published in:
CCS (2023)
Keyphrases
</>
extreme learning machines
countermeasures
computational complexity
malicious attacks
cyber attacks
attack detection
data sets
databases
special case
multistage
attack graph
security vulnerabilities