Skip to main content
Fig. 4 | Cybersecurity

Fig. 4

From: Attack based on data: a novel perspective to attack sensitive points directly

Fig. 4

Take the \(\textbf{35}\) th time point of ECG200 dataset as an example. The values at the 35th time point of each time series are spliced into a one-dimensional sequence, and the average value, standard deviation, number of peaks and valleys, skewness and kurtosis of the sequence are obtained through feature extraction. In the subsequent process, the sensitive rate of the \(\textbf{35}\) th time point will be predicted through these features

Back to article page