共 33 条
- [1] Al-Marri N.A.A.-A., 2020, INT BLACK SEA C COMM, P1, DOI [10.1109/BlackSeaCom48709.2020.9234959, DOI 10.1109/BLACKSEACOM48709.2020.9234959]
- [3] Walling up Backdoors in Intrusion Detection Systems [J]. BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS, 2019, : 8 - 13
- [4] Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
- [5] Biggio Battista, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P387, DOI 10.1007/978-3-642-40994-3_25
- [6] Biggio B., 2012, ICML, V2, P1807
- [8] Intrusion Detection for Wireless Edge Networks Based on Federated Learning [J]. IEEE ACCESS, 2020, 8 (08): : 217463 - 217472
- [9] FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing [J]. PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES, 2022, : 420 - 428
- [10] Mitigating Data Poisoning Attacks On a Federated Learning-Edge Computing Network [J]. 2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,