|
[1]
|
Ding, W., Zhang, Z., Martínez, L., Huang, Y., Cao, Z., Liu, J., et al. (2025) New Trends of Adversarial Machine Learning for Data Fusion and Intelligent System. Information Fusion, 114, Article 102683. [Google Scholar] [CrossRef]
|
|
[2]
|
Song, W., Frakes, D. and Dasi, L.P. (2024) Active Machine Learning for Pre-Procedural Prediction of Time-Varying Boundary Condition after Fontan Procedure Using Generative Adversarial Networks. Annals of Biomedical Engineering, 53, 217-229. [Google Scholar] [CrossRef] [PubMed]
|
|
[3]
|
Sayed, A., Alshathri, S. and Hemdan, E.E. (2024) Conditional Generative Adversarial Networks with Optimized Machine Learning for Fault Detection of Triplex Pump in Industrial Digital Twin. Processes, 12, Article 2357. [Google Scholar] [CrossRef]
|
|
[4]
|
Vadillo, J., Santana, R. and Lozano, J.A. (2024) Adversarial Attacks in Explainable Machine Learning: A Survey of Threats against Models and Humans. WIREs Data Mining and Knowledge Discovery, 15, e1567. [Google Scholar] [CrossRef]
|
|
[5]
|
Hong, J., Kim, H., Oh, S., Im, Y., Jeong, H., Kim, H., et al. (2024) Combating Phishing and Script-Based Attacks: A Novel Machine Learning Framework for Improved Client-Side Security. The Journal of Supercomputing, 81, Article No. 69. [Google Scholar] [CrossRef]
|
|
[6]
|
Li, G., Shao, X., Wang, P., Ma, X., Li, H. and Ye, H. (2024) Anti-Machine-Learning-Attack Strong PUF Design Based on Multi-Path Delay Selection Strategy. Microelectronics Journal, 153, Article 106434. [Google Scholar] [CrossRef]
|
|
[7]
|
Kumar, P., Yadav, P. and Singh, V. (2024) Exploring Steel Fiber Integration in Dry Lean Concrete: Predictive Analysis of Compressive Strength and Performance via Machine Learning. Asian Journal of Civil Engineering, 26, 263-271. [Google Scholar] [CrossRef]
|
|
[8]
|
Kotenko, I.V., Saenko, I.B., Lauta, O.S., Vasilev, N.A. and Sadovnikov, V.E. (2024) Approach to Detecting Attacks against Machine Learning Systems with a Generative Adversarial Network. Pattern Recognition and Image Analysis, 34, 589-596. [Google Scholar] [CrossRef]
|
|
[9]
|
李华瑞, 李文博, 李铮, 等. 基于生成对抗网络与度量学习的数据驱动频率安全评估[J]. 电力系统保护与控制, 2024, 52(18): 101-111.
|
|
[10]
|
张涛. 基于对抗机器学习的工业控制网络欺骗攻击行为检测系统设计[J]. 计算机测量与控制, 2024, 32(10): 298-304.
|
|
[11]
|
张翼, 程小曼, 管冬平. 基于对抗机器学习的网络入侵特征选择研究[J]. 电子设计工程, 2024, 32(18): 173-176+181.
|
|
[12]
|
林巍, 廖丽娟. 基于连续扰动生成方法的可持续对抗训练(英文) [J]. 信息技术与电子工程前沿, 2024, 25(4): 527-540.
|
|
[13]
|
冯光升, 蒋舜鹏, 胡先浪, 等. 面向物联网的入侵检测技术研究新进展[J]. 信息网络安全, 2024, 24(2): 167-178.
|
|
[14]
|
潘宇恒, 廖思贤, 杨朝俊, 等. 面向网络入侵检测的对抗攻击系统[J]. 电脑知识与技术, 2024, 20(4): 100-102.
|
|
[15]
|
Prathapani, A., Santhanam, L. and Agrawal, D.P. (2013) Detection of Blackhole Attack in a Wireless Mesh Network Using Intelligent Honeypot Agents. The Journal of Supercomputing, 64, 777-804. [Google Scholar] [CrossRef]
|
|
[16]
|
杨文焕, 武辉林, 王云丽, 等. 一种基于蜜罐的智能防御系统设计与应用[J]. 科技风, 2024(24): 1-3.
|
|
[17]
|
卜钰. 浅析工业蜜罐技术在工业互联网场景下应用[J]. 自动化博览, 2023, 40(8): 36-39.
|
|
[18]
|
冀甜甜, 方滨兴, 崔翔, 等. CADetector: 跨家族的各项异性合约蜜罐检测[J]. 计算机学报, 2022, 45(4): 877-895.
|
|
[19]
|
孙利民, 潘志文, 吕世超, 等. 智能制造场景下工业互联网安全风险与对策[J]. 信息通信技术与政策, 2021, 47(8): 24-29.
|
|
[20]
|
游建舟, 吕世超, 孙玉砚, 等. 物联网蜜罐综述[J]. 信息安全学报, 2020, 5(4): 138-156.
|