Login / Signup
Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention.
Bo Zhang
Yu-Jie Xiong
Chunming Xia
Yongbin Gao
Published in:
Comput. Secur. (2024)
Keyphrases
</>
end to end
wireless ad hoc networks
admission control
congestion control
ad hoc networks
high bandwidth
multipath
application layer
rate allocation
power system
scalable video