Author:
Sreevallabh Chivukula Aneesh,Yang Xinghao,Liu Bo,Liu Wei,Zhou Wanlei
Publisher
Springer International Publishing
Reference288 articles.
1. A. Abusnaina, A. Khormali, H. Alasmary, J. Park, A. Anwar, and A. Mohaisen, Adversarial learning attacks on graph-based iot malware detection systems, in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), 2019, pp. 1296–1305.
2. D. Adler, Genetic algorithms and simulated annealing: a marriage proposal, in IEEE International Conference on Neural Networks, March 1993, pp. 1104–1109 vol.2.
3. E. A.E., Evolutionary algorithms and constraint satisfaction: Definitions, survey, methodology, and research directions, in Kallel L., Naudts B., Rogers A. (eds) Theoretical Aspects of Evolutionary Computing., Springer, Berlin, Heidelberg, 2001.
4. M. Aghassi and D. Bertsimas, Robust game theory, Math. Program., 107 (2006), pp. 231–273.
5. I. M. Alabdulmohsin, X. Gao, and X. Zhang, Adding robustness to support vector machines against adversarial reverse engineering, in Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM ’14, New York, NY, USA, 2014, Association for Computing Machinery, pp. 231–240.