Author:
Fang Menghao,Li Xia,Wang Yuanyuan,Wang Qiuxuan,Sun Xinlei,Zhang Shuo
Publisher
Springer Nature Singapore
Reference16 articles.
1. Jin, K., Ye, D.: Optimal innovation-based stealthy attacks in networked LQG systems with attack cost. IEEE Trans. Cybern. 54(2), 787–796 (2024)
2. Hwang, R.-H., Lee, C.-L., Lin, Y-D., Po-Chin Lin, Hsiao-Kuang Wu, Yuan-Cheng Lai, C.K. Chen,
3. Quincozes, S.E., Raniery, C., Nunes, R.C., Albuquerque, C., Passos, D., Mossé, D.: Counselors network for intrusion detection. Int. J. Netw. Manag. 31(3), May/June 2021
4. Host-based intrusion detection with multi-datasource and deep learning. J. Inf. Secur. Appl. 78 (2023),103625, ISSN 2214-2126
5. Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Houlsby, N.: An image is worth 16x16 words: transformers for image recognition at scale (2020)