Login / Signup
A Taxonomy of Approaches for Integrating Attack Awareness in Applications.
Tolga Ünlü
Lynsay A. Shepherd
Natalie Coull
Colin McLean
Published in:
CoRR (2020)
Keyphrases
</>
data sets
strengths and weaknesses
neural network
real world
information retrieval
learning algorithm
artificial intelligence
computer vision
decision making
e learning
image processing
machine learning methods