共 62 条
[1]
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
[J].
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2020,
:888-898
[2]
IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method
[J].
APPLIED SCIENCES-BASEL,
2022, 12 (10)
[3]
Albulayhi K, 2021, 2021 IEEE WORLD AI IOT CONGRESS (AIIOT), P187, DOI [10.1109/AIIoT52608.2021.9454168, 10.1109/AIIOT52608.2021.9454168]
[4]
Aryal K., 2021, ARXIV
[5]
Carlini Nicholas., 2017, P AISEC
[7]
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:694-711
[8]
Generating Adversarial Examples for Static PE Malware Detector Based on Deep Reinforcement Learning
[J].
5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020),
2020, 1575
[9]
Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
[J].
2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC),
2017,
:99-106
[10]
Chen Steven, 2020, SPAI '20: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence, P30, DOI 10.1145/3385003.3410925