共 125 条
[71]
Fogla P, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P241
[72]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[73]
Fumera G, 2006, J MACH LEARN RES, V7, P2699
[75]
Goodfellow Ian J, 2015, P ICLR
[76]
Grohans Michael, 2013, P INT C MACH LEARN, P55
[77]
Adversarial Examples for Malware Detection
[J].
COMPUTER SECURITY - ESORICS 2017, PT II,
2017, 10493
:62-79
[79]
PhishEye: Live Monitoring of Sandboxed Phishing Kits
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1402-1413
[80]
Huang L., 2011, P 4 ACM WORKSH SEC A, P43