共 108 条
[51]
Adversarial Machine Learning - Industry Perspectives
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020),
2020,
:69-75
[52]
Black Box Attacks on Deep Anomaly Detectors
[J].
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019),
2019,
[53]
Characterization of Tor Traffic using Time based Features
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:253-262
[54]
Li Pan, 2018, IEEE INT C COMMUNICA
[55]
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter
[J].
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16),
2016,
:345-356
[57]
IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection
[J].
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT III,
2022, 13282
:79-91
[58]
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
[J].
IEEE ACCESS,
2018, 6
:12103-12117
[59]
Marchetti M, 2016, INT CONF CYBER CONFL, P243, DOI 10.1109/CYCON.2016.7529438
[60]
Marino DL, 2018, IEEE IND ELEC, P3237, DOI 10.1109/IECON.2018.8591457