共 26 条
- [1] Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
- [2] Awad A.I., 2021, SECURITY PRIVACY INT, V1st ed.
- [3] Detecting Poisoning Attacks on Machine Learning in IoT Environments [J]. 2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 57 - 64
- [4] Barreno M, 2006, P 2006 ACM S INF COM, P16, DOI DOI 10.1145/1128817.1128824
- [5] Bhandari A., 2023, Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence, P129
- [6] Biggio B., 2012, ARXIV
- [7] Data Poisoning Attacks against Autoencoder-based Anomaly Detection Models: a Robustness Analysis [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 5427 - 5432
- [9] Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
- [10] Ho E.S., 2022, Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions, P19