no code implementations • 23 Sep 2020 • Matthias Rottmann, Kira Maag, Mathis Peyron, Natasa Krejic, Hanno Gottschalk
In this work we outline a mathematical proof that the CW attack can be used as a detector itself.