Skip to main content
. 2023 Jul 10;6:14. doi: 10.1186/s42492-023-00140-9

Table 7.

Examples of ViT applications in security

Method Application
Jigsaw block-based encryption [96] Data encryption
MFVT [97] Anomaly detection
Image conversion from network data-flow [98] Network intrusion system detection
Zero-shot face [99] Anti-spoofing
Backdoor defender [100] Patch processing