A survey of attack and defense on human-computer interaction security
With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer inter...
Saved in:
Main Authors: | Kaiqiang GE, Tieming CHEN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2019-10-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2019196/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
GreyFan:a network attack framework using Wi-Fi covert channel
by: Dongjie MA, et al.
Published: (2019-09-01) -
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
by: Zohra Rezgui, et al.
Published: (2022-09-01) -
Survey on Byzantine attacks and defenses in federated learning
by: ZHAO Xiaojie, et al.
Published: (2024-12-01) -
Cloud Security Certification Technology Based on Fingerprint Recognition
by: Yafei Tang, et al.
Published: (2015-08-01) -
Survey of intention recognition for opponent modeling
by: Wei GAO, et al.
Published: (2021-08-01)