V-PSC: A Perturbation-Based Causative Attack Against DL Classifiers' Supply Chain in VANET
暂无分享,去创建一个
Meikang Qiu | Jian Xiong | Meiqin Liu | Yi Zeng | Jingqi Niu | Yanxin Long
[1] Pan Wang,et al. Datanet: Deep Learning Based Encrypted Network Traffic Classification in SDN Home Gateway , 2018, IEEE Access.
[2] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[3] Mianxiong Dong,et al. DeepNFV: A Lightweight Framework for Intelligent Edge Network Functions Virtualization , 2018, IEEE Network.
[4] Yiran Chen,et al. Generative Poisoning Attack Method Against Neural Networks , 2017, ArXiv.
[5] Meikang Qiu,et al. A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT , 2021, IEEE Transactions on Cloud Computing.
[6] Vasiliy Krundyshev,et al. Synthetic datasets generation for intrusion detection in VANET , 2018, SIN.
[7] Daniel Gibert Llauradó. Convolutional neural networks for malware classification , 2016 .
[8] Meikang Qiu,et al. Senior2Local: A Machine Learning Based Intrusion Detection Method for VANETs , 2018, SmartCom.
[9] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[10] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[11] Naveen K. Chilamkurti,et al. Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..
[12] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[13] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[14] Yi Zeng,et al. $Deep-Full-Range$ : A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework , 2019, IEEE Access.
[15] Zhihui Lu,et al. An efficient key distribution system for data fusion in V2X heterogeneous networks , 2019, Inf. Fusion.
[16] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[17] Jalel Ben-Othman,et al. Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks , 2014, 2014 IEEE Global Communications Conference.