attackGAN: Adversarial Attack against Black-box IDS using Generative Adversarial Networks
暂无分享,去创建一个
Jing Li | Lin Zhu | Zhao Zhang | Shuang Zhao | Jianmin Wang | Yong Zhang | Yong Zhang | Shuang Zhao | Lin Zhu | zhaoxu zhang | Jing Li | Jianmin Wang
[1] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[2] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[3] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[4] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[5] Mingyan Liu,et al. Spatially Transformed Adversarial Examples , 2018, ICLR.
[6] A. Malathi,et al. A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection , 2013 .
[7] Patrick D. McDaniel,et al. Adversarial Perturbations Against Deep Neural Networks for Malware Classification , 2016, ArXiv.
[8] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[9] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[10] Siddique Latif,et al. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).