搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Lingwei Chen , Yanfang Ye , Thirimachos Bourlai
DOI: 10.1109/EISIC.2017.21
关键词:
摘要: … widely deployed, the adversary incentive for defeating them … evasion attack and defense and explore the adversarial machine … selects features based on the capability of the attack. …
knowledge discovery and data mining,2018, 引用: 82
advances in social networks analysis and mining,2018, 引用: 12
arXiv: Cryptography and Security,2018, 引用: 17
ieee international autumn meeting on power electronics and computing,2018, 引用: 5
,2019, 引用: 10
conference on data and application security and privacy,2019, 引用: 4
2019 Conference on Next Generation Computing Applications (NextComp),2019, 引用: 0
arXiv: Cryptography and Security,2019, 引用: 53
Journal of Network and Computer Applications,2020, 引用: 311
international conference on information and communication security,2019, 引用: 1