共 26 条
- [1] ZHANG J, PAN L, HAN Q L, Et al., Deep learning based attack detection for cyber-physical system cybersecurity:a survey[J], IEEE/CAA Journal of Automatica Sinica, 9, 3, pp. 377-391, (2021)
- [2] MIAO Y T, CHEN C, PAN L, Et al., Machine learning–based cyber attacks targeting on controlled information[J], ACM Computing Surveys, 54, 7, pp. 1-36, (2022)
- [3] YANG H Y, ZHANG Z X, XIE L X, Et al., Network security situation assessment with network attack behavior classification [J], International Journal of Intelligent Systems, 37, 10, pp. 6909-6927, (2022)
- [4] YANG H Y, WANG Z L, ZHANG L A, Et al., IoT botnet detection with feature reconstruction and interval optimization[J], International Journal of Intelligent Systems, 37, 12, pp. 12009-12034, (2022)
- [5] WANG J L, ZHOU S W, JIN C C., Method of deep learning image compressed sensing based on adversarial samples[J], Journal of Hunan University(Natural Sciences), 49, 4, pp. 11-17, (2022)
- [6] GOODFELLOW I J, SHLENS J, SZEGEDY C., Explaining and harnessing adversarial examples [EB/OL], (2014)
- [7] ZHANG T, YANG K W, WEI J H, Et al., Survey on detecting and defending adversarial examples for image data[J], Journal of Computer Research and Development, 59, 6, pp. 1315-1328, (2022)
- [8] XU H, MA Y, LIU H C, Et al., Adversarial attacks and defenses in images, graphs and text:a review[J], International Journal of Automation and Computing, 17, 2, pp. 151-178, (2020)
- [9] AKHTAR N, MIAN A., Threat of adversarial attacks on deep learning in computer vision:a survey[J], IEEE Access, 6, pp. 14410-14430, (2018)
- [10] KIANI S, AWAN S N, LAN C, Et al., Two souls in an adversarial image:towards universal adversarial example detection using multi-view inconsistency[C], ACSAC’21:Annual Computer Security Applications Conference, pp. 31-44, (2021)