共 108 条
[41]
Ibitoye O, 2020, Arxiv, DOI arXiv:1911.02621
[42]
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
[J].
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM),
2019,
[43]
Ilyas A, 2019, ADV NEUR IN, V32
[44]
Ilyas Andrew, 2018, P MACHINE LEARNING R, V80
[45]
Feature Space Perturbations Yield More Transferable Adversarial Examples
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:7059-7067
[46]
Janusz A, 2019, IEEE INT CONF BIG DA, P5881, DOI [10.1109/BigData47090.2019.9005668, 10.1109/bigdata47090.2019.9005668]
[47]
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks
[J].
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016),
2016,
[48]
Kantchelian A, 2016, PR MACH LEARN RES, V48
[49]
Khalil K, 2016, IEEE GLOB COMM CONF
[50]
Kloft M., 2010, Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, P405