共 47 条
[1]
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
[J].
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019),
2019,
:1296-1305
[2]
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:76-82
[3]
Convolutional Neural Networks over Control Flow Graphs for Software Defect Prediction
[J].
2017 IEEE 29TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2017),
2017,
:45-52
[4]
[Anonymous], 2015, FPS
[5]
[Anonymous], VIRUSSHARE
[6]
[Anonymous], VirusTotal
[7]
Braue D., 2015, Security tools taking too long to detect new malware, analysis warns
[8]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[9]
Chen JY, 2018, Arxiv, DOI arXiv:1809.02797
[10]
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448