1 code implementation • ICLR 2020 • Roy Mor, Erez Peterfreund, Matan Gavish, Amir Globerson
Are there optimal strategies for the attacker or the authenticator?
Anomaly Detection