Author:
Fehrman Brian,Akowuah Francis,Xu Shengjie
Publisher
Springer Nature Switzerland
Reference31 articles.
1. Bradley, M., Xu, S.: A metric for machine learning vulnerability to adversarial examples. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1–2. IEEE (2021)
2. Burr, J., Xu, S.: Improving adversarial attacks against executable raw byte classifiers. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1–2. IEEE (2021)
3. Chaudhary, S., O’Brien, A., Xu, S.: Automated post-breach penetration testing through reinforcement learning. In: 2020 IEEE Conference on Communications and Network Security (CNS), pp. 1–2. IEEE (2020)
4. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adverserial ML. In: International Conference on Learning Representations (ICLR), pp. 1–11 (2015)
5. Computer Hope: Microsoft Defender Antivirus (2022). https://www.computerhope.com/jargon/w/windefen.htm