Author:
Rathore Hemant,Nandanwar Adarsh,Sahay Sanjay K.,Sewak Mohit
Subject
Law,Medical Laboratory Technology,Computer Science Applications,Information Systems,Pathology and Forensic Medicine
Reference25 articles.
1. Permpair: android malware detection using permission pairs;Arora;IEEE Trans. Inf. Forensics Secur.,2019
2. A survey on adversarial recommender systems: from attack/defense strategies to generative adversarial networks;Deldjoo;ACM Comput. Surv.,2021
3. Explaining and harnessing adversarial examples;Goodfellow,2015
4. Adversarial Perturbations against Deep Neural Networks for Malware Classification;Grosse,2016
5. Generating Adversarial Malware Examples for Black-Box Attacks Based on gan;Hu,2017
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献