共 36 条
[2]
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
[J].
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE,
2019,
:383-400
[3]
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[4]
Barrett P, 2005, ASTR SOC P, V347, P91
[5]
Brundage M, 2018, Arxiv, DOI [arXiv:1802.07228, 10.48550/arXiv.1802.07228, DOI 10.48550/ARXIV.1802.07228]
[6]
Chen T, 2014, INT WORKS HIGH MOBIL, P1, DOI 10.1109/HMWC.2014.7000203
[7]
Towards a taxonomy of intrusion-detection systems
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
1999, 31 (08)
:805-822
[9]
Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:50-56
[10]
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672