Login / Signup
GM-Attack: Improving the Transferability of Adversarial Attacks.
Jinbang Hong
Keke Tang
Chao Gao
Songxin Wang
Sensen Guo
Peican Zhu
Published in:
KSEM (3) (2022)
Keyphrases
</>
countermeasures
attack detection
malicious users
malicious attacks
differential power analysis
denial of service attacks
fault injection
network intrusions
ddos attacks
power analysis
normal traffic
data corruption
cyber attacks
dos attacks
network attacks
attack scenarios
digital watermark
network intrusion
information leakage
detect malicious
security risks
block cipher
injection attacks
network traffic
phishing attacks
detecting malicious
java card
security measures
buffer overflow
insider attacks
grey model
computer security
grey theory
malicious nodes
security vulnerabilities
denial of service