共 107 条
[51]
IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection
[J].
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT III,
2022, 13282
:79-91
[52]
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks
[J].
2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019),
2019,
:64-75
[53]
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey
[J].
APPLIED SCIENCES-BASEL,
2019, 9 (20)
[54]
Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review
[J].
IEEE ACCESS,
2020, 8
:35403-35419
[55]
Impact of artificial "Gummy" fingers on fingerprint systems
[J].
OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES IV,
2002, 4677
:275-289
[56]
McCarthy A, 2022, J CYBERSECUR 1, V2, P154, DOI [DOI 10.3390/JCP2010010, 10.3390/jcp2010010]
[57]
Metzen Jan Hendrik, 2017, P INT C LEARN REPR I
[58]
DeepFool: a simple and accurate method to fool deep neural networks
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:2574-2582
[59]
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)
[60]
Panigrahi R., 2018, INT J ENG TECHNOLOGY, V7, P479, DOI [10.14419/ijet.v7i3.24.22797, DOI 10.14419/IJET.V7I3.24.22797]