共 44 条
[21]
Kirda RLE, 2009, LECT NOTES COMPUT, V5758
[23]
Nelson B., 2008, LEET, V8, P9
[24]
Notra S, 2014, IEEE CONF COMM NETW, P79, DOI 10.1109/CNS.2014.6997469
[25]
Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things
[J].
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19),
2019,
:140-150
[27]
The Limitations of Deep Learning in Adversarial Settings
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:372-387
[28]
Petrovski A. V., 2018, 2018 Int'l Joint Conf. on Neural Networks, P1, DOI [DOI 10.1109/IJCNN.2018.8489489, 10.1109/IJCNN.2018.8489489]
[29]
Refaeilzadeh Payam, 2009, ENCY DATABASE SYSTEM, V5, P532, DOI [10.1007/978-0-387-39940-9_565, DOI 10.1007/978-0-387-39940-9565]
[30]
Rigaki Maria, 2017, Master's thesis