共 33 条
[1]
Al-Marri N.A.A.-A., 2020, INT BLACK SEA C COMM, P1, DOI [10.1109/BlackSeaCom48709.2020.9234959, DOI 10.1109/BLACKSEACOM48709.2020.9234959]
[2]
[Anonymous], 2012, Poisoning Attacks against Support Vector Machines, DOI 10.48550/arxiv.1206.6389
[4]
Walling up Backdoors in Intrusion Detection Systems
[J].
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS,
2019,
:8-13
[5]
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[6]
Biggio Battista, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P387, DOI 10.1007/978-3-642-40994-3_25
[8]
Intrusion Detection for Wireless Edge Networks Based on Federated Learning
[J].
IEEE ACCESS,
2020, 8
:217463-217472
[9]
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing
[J].
PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES,
2022,
:420-428
[10]
Mitigating Data Poisoning Attacks On a Federated Learning-Edge Computing Network
[J].
2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC),
2021,