共 50 条
- [1] Malicious attack detection based on traffic-flow information fusion [J]. 2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
- [2] ICMP Based Malicious Attack Identification Method for DHCP [J]. 2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014), 2014,
- [3] TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1429 - 1438
- [4] Backdoor Attack Defense Method for Federated Learning Based on Model Watermarking [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 662 - 676
- [5] A General Backdoor Attack to Graph Neural Networks Based on Explanation Method [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 759 - 768
- [6] Identification method for malicious traffic in industrial Internet under new unknown attack scenarios [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (06): : 75 - 86
- [8] A Malicious Domains Detection Method Based on File Sandbox Traffic [J]. IEEE NETWORK, 2023, 37 (06): : 182 - 188
- [9] Genetic Algorithm-Based Dynamic Backdoor Attack on Federated Learning-Based Network Traffic Classification [J]. 2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, : 204 - 209
- [10] Research of malicious code attack effect based on synthetic entropy method [J]. Li, P. (lipeng@njupt.edu.cn), 1600, Chinese Institute of Electronics (22):