Login / Signup
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly.
Qizhang Li
Yiwen Guo
Wangmeng Zuo
Hao Chen
Published in:
CoRR (2023)
Keyphrases
</>
transfer learning
malicious users
watermarking scheme
watermarking algorithm
traffic analysis
terrorist attacks
search engine
information systems
case study
countermeasures
computer security
image watermarking