Login / Signup
Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions.
Evangelia Anna Markatou
Francesca Falzon
Roberto Tamassia
William Schor
Published in:
CCS (2021)
Keyphrases
</>
information leakage
malicious attacks
countermeasures
security protocols
genetic algorithm
watermarking scheme
multiple dimensions
ddos attacks
secure routing
attack detection
security risks
traffic analysis
java card
image watermarking
real time
multi dimensional
multiscale
neural network
data sets