Publisher
Springer International Publishing
Reference35 articles.
1. Anderson, H.S., Kharkar, A., Filar, B., Evans, D., Roth, P.: Learning to evade static PE machine learning malware models via reinforcement learning. CoRR abs/1801.08917 (2018). http://arxiv.org/abs/1801.08917
2. Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M.: A survey of botnet technology and defenses. In: 2009 Cybersecurity Applications Technology Conference for Homeland Security, pp. 299–304 (2009)
3. Bromley, J., et al.: Signature verification using a “Siamese’’ time delay neural network. Int. J. Pattern Recogn. Artif. Intell. 7(4), 669–688 (1993). https://doi.org/10.1142/S0218001493000339
4. Buchner, J.: ImageHash-PyPi (2020). https://pypi.org/project/ImageHash/
5. Chatterjee, S., Zielinski, P.: On the generalization mystery in deep learning. CoRR abs/2203.10036 (2022). https://doi.org/10.48550/arXiv.2203.10036
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献