From post

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.

, , , , , и . ACISP, том 12248 из Lecture Notes in Computer Science, стр. 268-284. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Methods for Detecting XSS Attacks Based on BERT and BiLSTM., , , и . ICMSS, стр. 1-7. IEEE, (2024)Attack detection model for BCoT based on contrastive variational autoencoder and metric learning., , , , , , и . J. Cloud Comput., 13 (1): 125 (декабря 2024)Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus., , , , и . Int. J. Pattern Recognit. Artif. Intell., 33 (14): 1955015:1-1955015:15 (2019)Research on information steganography based on network data stream., , , , , и . Neural Comput. Appl., 33 (3): 851-866 (2021)TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems., , , , , и . Sensors, 18 (8): 2630 (2018)Confidential information protection method of commercial information physical system based on edge computing., , и . Neural Comput. Appl., 33 (3): 897-907 (2021)HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization., , , , , , и . Neural Networks, (2024)A temporal correlation and traffic analysis approach for APT attacks detection., , , и . Clust. Comput., 22 (Supplement): 7347-7358 (2019)Moving target defense controller of mobile system based on Openflow sensor security scheme., и . Comput. Commun., (2020)具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate)., , , , и . 计算机科学, 45 (7): 135-138 (2018)