Publisher
Springer Science and Business Media LLC
Reference39 articles.
1. Yuan, X., Lin, G., Tai, Y., Zhang, J.: Deep neural embedding for software vulnerability discovery: comparison and optimization. Secur. Commu. Netw. 2022, 1–12 (2022)
2. Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., Zhou, W.: Security and privacy in 6g networks: new areas and new challenges. Digit. Commun. Netw. 6(3), 281–291 (2020)
3. Miao, Y., Chen, C., Pan, L., Han, Q.-L., Zhang, J., Xiang, Y.: Machine learning based cyber attack targeting on controlled information. ACM Comput. Surv. 54(7), 1–36 (2022)
4. Chen, X., Li, C., Wang, D., et al.: Android HIV: a case study of repackaging malware for evading machine learning detection. IEEE Trans. Inf. Forensics Secur. 15, 987–1001 (2019)
5. Li, X., et al.: A mining approach to obtain the software vulnerability characteristics. In: Proceedings of Fifth International Conference on Advanced Cloud and Big Data, CBD 2017, vol. 1, pp. 296–301 (2017). https://doi.org/10.1109/CBD.2017.58