Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems
暂无分享,去创建一个
Yuguang Fang | Chi Zhang | Kaichen Yang | Jianqing Liu | Yuguang Fang | Chi Zhang | Jianqing Liu | Kaichen Yang
[1] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[3] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[4] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[5] Yu-Lin He,et al. Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..
[6] R. Hecht-Nielsen,et al. Theory of the Back Propagation Neural Network , 1989 .
[7] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[8] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[9] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[10] Maria Rigaki,et al. Adversarial deep learning against intrusion detection classifiers , 2017 .
[11] Patrick D. McDaniel,et al. On the (Statistical) Detection of Adversarial Examples , 2017, ArXiv.
[12] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[13] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[14] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[15] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[16] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[17] Zheng Wang,et al. Deep Learning-Based Intrusion Detection With Adversaries , 2018, IEEE Access.
[18] Patrick D. McDaniel,et al. Adversarial Examples for Malware Detection , 2017, ESORICS.
[19] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[20] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[21] Jinfeng Yi,et al. ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models , 2017, AISec@CCS.
[22] Patrick D. McDaniel,et al. Cleverhans V0.1: an Adversarial Machine Learning Library , 2016, ArXiv.
[23] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[24] Ling Gao,et al. An Intrusion Detection Model Based on Deep Belief Networks , 2014 .
[25] Dan Boneh,et al. The Space of Transferable Adversarial Examples , 2017, ArXiv.
[26] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[27] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[28] Tom Verhoeff,et al. Delay-insensitive codes — an overview , 1988, Distributed Computing.