共 16 条
[1]
Androutsopoulos Ion, 2000, P WORKSH MACH LEARN, P1
[2]
[Anonymous], 2008, LEET
[3]
[Anonymous], 2018, 6 INT C COMP AID DES, V1967
[4]
Bratko A, 2006, J MACH LEARN RES, V7, P2673
[5]
Chitti Subramanyam, 2005, IEEE INT C COLL COMP
[7]
Martins Nuno, 2020, Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review, V8, P35403
[8]
Metsis Vangelis, 2006, 3 C EM ANT CEAS MOUN
[9]
Pawar K, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), P197, DOI 10.1109/ICRCICN.2015.7434235
[10]
Peng JY, 2013, INT CONF MACH LEARN, P610, DOI 10.1109/ICMLC.2013.6890364