共 50 条
- [2] Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques [J]. Neural Computing and Applications, 2022, 34 : 12077 - 12096
- [3] Evading Classifiers by Morphing in the Dark [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 119 - 133
- [4] Evading Botnet Detection [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1331 - 1340
- [5] Automatically Evading Classifiers A Case Study on PDF Malware Classifiers [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
- [6] Evading API Call Sequence Based Malware Classifiers [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 18 - 33
- [7] CharBot: A Simple and Effective Method for Evading DGA Classifiers [J]. IEEE ACCESS, 2019, 7 : 91759 - 91771
- [9] Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT II, 2022, 461 : 153 - 173
- [10] Evading PDF Malware Classifiers with Generative Adversarial Network [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 374 - 387