共 26 条
[12]
Gibert G., 2023, COMPUT SECURITY ESOR, P683
[13]
Goodfellow IJ, 2015, Arxiv, DOI arXiv:1412.6572
[14]
Kolosnjaji B, 2018, EUR SIGNAL PR CONF, P533, DOI 10.23919/EUSIPCO.2018.8553214
[15]
Krcal O., 2018, 6THINT C LEARN REPRE, P1
[16]
Kreuk F, 2019, Arxiv, DOI arXiv:1802.04528
[17]
Levine S., 2020, Adv. Neural Inf. Process. Syst., P1
[18]
Lucas K, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P1163
[19]
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
[J].
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:744-758
[20]
Paszke A, 2019, ADV NEUR IN, V32