共 59 条
- [1] Abedi A, 2021, Arxiv, DOI arXiv:2011.03180
- [2] Abuadbba Sharif, 2020, ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, P305, DOI 10.1145/3320269.3384740
- [3] [Anonymous], 2016, White paper
- [4] Avent B., 2019, arXiv
- [5] Castro P, 2022, Arxiv, DOI arXiv:2208.04213
- [6] Cohen G, 2017, IEEE IJCNN, P2921, DOI 10.1109/IJCNN.2017.7966217
- [7] Fan Mo, 2021, MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, P94, DOI 10.1145/3458864.3466628
- [8] Fan Mo, 2020, MobiSys '20: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services, P161, DOI 10.1145/3386901.3388946
- [9] Gabriel E, 2004, LECT NOTES COMPUT SC, V3241, P97
- [10] Gu ZS, 2020, Arxiv, DOI arXiv:1807.00969