Adversarial Perturbation Attacks on GLRT-Based Detectors.
Ismail AlkhouriGeorge K. AtiaWasfy MikhaelPublished in: ISCAS (2020)
Keyphrases
- neural network
- countermeasures
- object detection
- traffic analysis
- watermarking scheme
- generalized likelihood ratio test
- security threats
- chosen plaintext
- security protocols
- watermarking algorithm
- corner detection
- denial of service attacks
- malicious attacks
- terrorist attacks
- attack detection
- data corruption
- multiscale