Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning
暂无分享,去创建一个
[1] Benjamin Recht,et al. Random Features for Large-Scale Kernel Machines , 2007, NIPS.
[2] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[3] Christopher Leckie,et al. R1SVM: A Randomised Nonlinear Approach to Large-Scale Anomaly Detection , 2015, AAAI.
[4] Marimuthu Palaniswami,et al. Pattern based anomalous user detection in cognitive radio networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[6] Blaine Nelson,et al. Adversarial machine learning , 2019, AISec '11.
[7] Bhavani M. Thuraisingham,et al. Adversarial support vector machine learning , 2012, KDD.
[8] Alexander J. Smola,et al. Fastfood: Approximate Kernel Expansions in Loglinear Time , 2014, ArXiv.
[9] Christopher Leckie,et al. Large-scale strategic games and adversarial machine learning , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[10] Seyed-Mohsen Moosavi-Dezfooli,et al. Robustness of classifiers: from adversarial to random noise , 2016, NIPS.
[11] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[12] Marius Kloft,et al. Security analysis of online centroid anomaly detection , 2010, J. Mach. Learn. Res..
[13] James C. Bezdek,et al. Some new indexes of cluster validity , 1998, IEEE Trans. Syst. Man Cybern. Part B.
[14] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[15] Bernhard Schölkopf,et al. Support Vector Method for Novelty Detection , 1999, NIPS.
[16] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.