Author:
Sandeepa Chamara,Senevirathna Thulitha,Siniarski Bartlomiej,Nguyen Manh-Dung,La Vinh-Hoa,Wang Shen,Liyanage Madhusanka
Publisher
Springer Nature Switzerland
Reference17 articles.
1. Arivudainambi, D., KA, V.K., Visu, P., et al.: Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance. Comput. Commun. 147, 50–57 (2019)
2. Lecture Notes in Computer Science;V Artem,2019
3. Aryal, K., Gupta, M., Abdelsalam, M.: Analysis of label-flip poisoning attack on machine learning based malware detector. In: 2022 IEEE International Conference on Big Data (Big Data), pp. 4236–4245. IEEE (2022)
4. Deldjoo, Y., Noia, T.D., Merra, F.A.: A survey on adversarial recommender systems: from attack/defense strategies to generative adversarial networks. ACM Comput. Surv. (CSUR) 54(2), 1–38 (2021)
5. Demontis, A., et al.: Why do adversarial attacks transfer? Explaining transferability of evasion and poisoning attacks. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 321–338 (2019)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Leveraging Machine Learning for Next-Generation Cyber Security;2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario (ICPSITIAGS);2023-12-28
2. 6G Security Vision - A Concise Update;2023 IEEE Future Networks World Forum (FNWF);2023-11-13