共 81 条
[1]
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
[J].
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019),
2019,
:1296-1305
[2]
Alasmary Hisham, 2018, Computational Data and Social Networks. 7th International Conference, CSoNet 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11280), P259, DOI 10.1007/978-3-030-04648-4_22
[3]
Alexey Kurakin, 2018, ARTIF INTELL
[4]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[7]
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
[J].
DIGITAL THREATS: RESEARCH AND PRACTICE,
2022, 3 (03)
[8]
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
[J].
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE,
2019,
:383-400
[9]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[10]
Balla P.B., 2018, P 2018 INT C SMART C, V7, P1, DOI [10.1109/ICSCET.2018.8537344, DOI 10.1109/ICSCET.2018.8537344]