GM-Attack: Improving the Transferability of Adversarial Attacks.
Jinbang HongKeke TangChao GaoSongxin WangSensen GuoPeican ZhuPublished in: KSEM (3) (2022)
Keyphrases
- countermeasures
- attack detection
- malicious users
- malicious attacks
- differential power analysis
- denial of service attacks
- fault injection
- network intrusions
- ddos attacks
- power analysis
- normal traffic
- data corruption
- cyber attacks
- dos attacks
- network attacks
- attack scenarios
- digital watermark
- network intrusion
- information leakage
- detect malicious
- security risks
- block cipher
- injection attacks
- network traffic
- phishing attacks
- detecting malicious
- java card
- security measures
- buffer overflow
- insider attacks
- grey model
- computer security
- grey theory
- malicious nodes
- security vulnerabilities
- denial of service