Login / Signup

Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly.

Qizhang LiYiwen GuoWangmeng ZuoHao Chen
Published in: CoRR (2023)
Keyphrases
  • transfer learning
  • malicious users
  • watermarking scheme
  • watermarking algorithm
  • traffic analysis
  • terrorist attacks
  • search engine
  • information systems
  • case study
  • countermeasures
  • computer security
  • image watermarking