共 13 条
- [1] [Anonymous], 2005, P 11 ACM SIGKDD INT, DOI [10.1145/1081870.1081950, DOI 10.1145/1081870.1081950]
- [2] Barreno M, 2006, P 2006 ACM S INF COM, P16, DOI DOI 10.1145/1128817.1128824
- [3] Biggio Battista, 2017, Security Evaluation of Pattern Classifiers under Attack, DOI [10.1109/TKDE.ArXiv2013.57, DOI 10.1109/TKDE.ARXIV2013.57]
- [4] Chen YZ, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2343
- [5] Elingiusti M, 2018, ADV INFORM SECUR, V70, P169, DOI 10.1007/978-3-319-73951-9_9
- [6] Liu Ran, 2023, 2023 IEEE INT C BIG, P3017, DOI [10.1109/BigData59044.2023.10386516, DOI 10.1109/BIGDATA59044.2023.10386516]
- [8] Smutz C, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P239
- [9] When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [10] Hidost: a static machine-learning-based detector of malicious files [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2016,