Author:
Shi Yi,Sagduyu Yalin E.,Davaslioglu Kemal,Levy Renato
Publisher
Springer International Publishing
Reference34 articles.
1. Stratosphere IPS (2018). https://www.stratosphereips.org . Accessed 15 Mar 2018
2. Silver D, Huang A, Maddison CJ, Guez A, Sifre L, Van Den Driessche G, Schrittwieser J, Antonoglou I, Panneershelvam V, Lanctot M, et al (2016) Mastering the game of Go with deep neural networks and tree search. Nature 529(7587), 484–489
3. Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572
4. Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar J (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence. ACM, pp 43–58
5. Miller B, Kantchelian A, Afroz S, Bachwani R, Dauber E, Huang L, Tschantz MC, Joseph AD, Tygar JD (2014) Adversarial active learning. In: Proceedings of the 2014 workshop on artificial intelligent and security workshop. ACM, pp 3–14
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Coverage-Oriented Fuzzing Test Method for Embedded Firmware;2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR);2024-03-16
2. Adversarial Machine Learning in Wireless Communications Using RF Data: A Review;IEEE Communications Surveys & Tutorials;2023
3. Adversarial Machine Learning for 5G Communications Security;Game Theory and Machine Learning for Cyber Security;2021-09-12
4. Generative Adversarial Network for Wireless Signal Spoofing;Proceedings of the ACM Workshop on Wireless Security and Machine Learning - WiseML 2019;2019