The Efficacy of Transformer-based Adversarial Attacks in Security Domains.
Kunyang LiKyle DomicoJean-Charles Noirot FerrandPatrick D. McDanielPublished in: CoRR (2023)
Keyphrases
- security threats
- security mechanisms
- security problems
- computer security
- security measures
- java card
- security vulnerabilities
- countermeasures
- cyber attacks
- security protocols
- information security
- security issues
- security breaches
- stream cipher
- security risks
- fault injection
- chosen plaintext
- fuzzy logic
- intrusion detection
- denial of service attacks
- malicious users
- cryptographic protocols
- cyber security
- security flaws
- security policies
- network security
- smart card
- malicious attacks
- cryptographic algorithms
- information leakage
- identity theft
- security management
- security requirements
- insider attacks
- access control
- attack scenarios
- secure routing
- intrusion prevention
- multi agent
- power system
- high voltage
- statistical databases
- security properties
- biometric template
- key management
- fault diagnosis
- secret key