共 71 条
[21]
Adversarial Training of Gradient-Boosted Decision Trees
[J].
PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19),
2019,
:2429-2432
[22]
Carlini N., 2018, PROC IEEE SECURITY P, P1
[24]
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[25]
Chernikova A., 2020, FENCE FEASIBLE EVASI
[26]
Chuanlong Y., 2019, SPRINGER J SUPERCOMP, V76, P6690
[27]
Evading Classifiers by Morphing in the Dark
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:119-133
[28]
Demontis A, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P321
[29]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[30]
Fajana O., 2018, P IEEE 17 INT S NETW, P1