Abstract: Current state-of-the-art plug-and-play countermeasures for mitigating adversarial examples (i.e., purification and detection) exhibit several fatal limitations, impeding their deployment in ...
Abstract: Authenticated key agreement schemes for multi-server architecture enable a user to register with one registration server and access multiple remote application servers rapidly and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results