Subverting Network Intrusion Detection: Crafting Adversarial Examples Accounting for Domain-Specific Constraints
暂无分享,去创建一个
[1] Sang Hyun Kim,et al. Method of intrusion detection using deep neural network , 2017, 2017 IEEE International Conference on Big Data and Smart Computing (BigComp).
[2] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[3] David Wagner,et al. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods , 2017, AISec@CCS.
[4] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[6] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[7] Xue Wang,et al. Comparison deep learning method to traditional methods using for network intrusion detection , 2016, 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN).
[8] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014 .
[9] Aleksander Madry,et al. On Evaluating Adversarial Robustness , 2019, ArXiv.
[10] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[11] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[12] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[13] Yuguang Fang,et al. Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[14] Aboubaker Lasebae,et al. Intrusion Detection and Classification with Autoencoded Deep Neural Network , 2018, SecITC.
[15] Hongxing He,et al. Outlier Detection Using Replicator Neural Networks , 2002, DaWaK.
[16] Joachim Fabini,et al. Explainability and Adversarial Robustness for RNNs , 2019, 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService).
[17] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[18] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[19] Carole Lartizien,et al. Converting SVDD scores into probability estimates: Application to outlier detection , 2017, Neurocomputing.
[20] Eric Keller,et al. Towards Evaluation of NIDSs in Adversarial Setting , 2019, Big-DAMA@CoNEXT.
[21] Patrick D. McDaniel,et al. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples , 2016, ArXiv.
[22] Xueqin Zhang,et al. Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks , 2020, IEEE Access.
[23] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).