共 15 条
- [2] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
- [3] Boosting Adversarial Attacks with Momentum [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 9185 - 9193
- [4] Goodfellow IJ., EXPLAINING HARNESSIN
- [5] Hilbe JM, 2009, CH CRC TEXT STAT SCI, P1
- [6] A survey of deep learning-based network anomaly detection [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 949 - 961
- [8] Madry A., DEEP LEARNING MODELS
- [10] Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,