共 146 条
- [1] Abri F, 2019, IEEE INT CONF BIG DA, P3252, DOI 10.1109/BigData47090.2019.9006514
- [3] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J]. 2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1296 - 1305
- [4] Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems [J]. COMPUTATIONAL DATA AND SOCIAL NETWORKS, 2019, 11917 : 268 - 281
- [5] Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 76 - 82
- [6] Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
- [7] Anderson H. S., 2017, Black Hat
- [8] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [9] Athalye A, 2018, PR MACH LEARN RES, V80
- [10] AV-TEST, 2022, Malware Statistics & Trends Report | AV-TEST