Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Wenbo Liu, Qiong Huang 0001, Xinjian Chen 0004, Hongbo Li 0004 |
Efficient functional encryption for inner product with simulation-based security. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M. Poskitt |
Deriving invariant checkers for critical infrastructure using axiomatic design principles. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Bingyu Liu, Shangyu Xie, Yuanzhou Yang, Rujia Wang, Yuan Hong |
Privacy preserving divisible double auction with a hybridized TEE-blockchain system. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sabarathinam Chockalingam, Wolter Pieters, André Teixeira 0001, Pieter H. A. J. M. van Gelder |
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jianguo Jiang, Baole Wei, Min Yu 0001, Gang Li 0009, Boquan Li 0002, Chao Liu 0020, Min Li, Weiqing Huang |
An end-to-end text spotter with text relation networks. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Anaadumba, Qi Liu 0001, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu 0002, Yonghong Zhang |
A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jingdian Ming, Yongbin Zhou, Huizhong Li, Qian Zhang 0042 |
A secure and highly efficient first-order masking scheme for AES linear operations. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng |
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang 0008, Baoxu Liu |
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | M. R. Gauthama Raman, Chuadhry Mujeeb Ahmed, Aditya Mathur |
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ruigang Liang, Ying Cao 0006, Peiwei Hu, Kai Chen 0012 |
Neutron: an attention-based neural decompiler. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin |
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Pei-Yi Lin, Chia-Wei Tien, Ting-Chun Huang, Chin-Wei Tien |
ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Alex Shafarenko |
Indexing structures for the PLS blockchain. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Chen Gao, Xuan Zhang 0002, Hui Liu |
Data and knowledge-driven named entity recognition for cyber security. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jonah Burgess, Philip O'Kane, Sakir Sezer, Domhnall Carlin |
LSTM RNN: detecting exploit kits using redirection chain sequences. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Ansam Khraisat, Ammar Alazab |
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yuhang Zhao, Ruigang Liang, Xiang Chen 0005, Jing Zou |
Evaluation indicators for open-source software: a review. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline, Aram Galstyan |
Bin2vec: learning representations of binary executable programs for security tasks. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Alex Shafarenko |
A PLS blockchain for IoT applications: protocols and architecture. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Zuoguang Wang, Hongsong Zhu, Peipei Liu, Limin Sun |
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Sagar Sharma, Keke Chen |
Confidential machine learning on untrusted platforms: a survey. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin 0001, Uzzal Kumar Acharjee |
An efficient hybrid system for anomaly detection in social networks. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo |
B2SMatcher: fine-Grained version identification of open-Source software in binary files. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Waleed Alghamdi, Michael Schukat |
Precision time protocol attack strategies and their resistance to existing security extensions. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Wenqin Cao, Wentao Zhang |
Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu 0001, Yongcheng Song |
Verifiable image revision from chameleon hashes. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Nezer Jacob Zaidenberg |
Hypervisor-assisted dynamic malware analysis. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Zhilong Wang, Peng Liu 0005 |
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin |
Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yiru Sun, Yanyan Liu |
An efficient fully dynamic group signature with message dependent opening from lattice. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur |
Cascading effects of cyber-attacks on interconnected critical infrastructure. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Wang, Xiaolin Chang, Yixiang Wang, Ricardo J. Rodríguez, Jianan Zhang |
LSGAN-AT: enhancing malware detector robustness against adversarial examples. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Hui Liu, Li Yang |
Quantum key recovery attack on SIMON32/64. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Runchen Gao, Shen Li, Yuqi Gao, Rui Guo |
A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Yin, Yanni Han, Zhen Xu 0009, Jie Liu |
VAECGAN: a generating framework for long-term prediction in multivariate time series. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Ullah, Raja Zahilah Raja Mohd Radzi |
Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Lulu Yang, Chen Li, Ruibang You, Bibo Tu, Linghui Li |
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. |
Cybersecur. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Guanyu Li, Dong Du 0003, Yubin Xia |
Iso-UniK: lightweight multi-process unikernel through memory protection keys. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang 0026 |
Lightning-fast and privacy-preserving outsourced computation in the cloud. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shuzhou Sun, Hui Ma 0002, Rui Zhang 0002, Wenhan Xu |
Server-aided immediate and robust user revocation mechanism for SM9. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shisen Fang, Shaojun Yang 0001, Yuexin Zhang |
Inner product encryption from ring learning with errors. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Florian Skopik, Timea Pahi |
Under false flag: using technical artifacts for cyber attack attribution. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yoon-Ho Choi, Peng Liu 0005, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou |
Using deep learning to solve computer security challenges: a survey. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang |
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rachid Ait Maalem Lahcen, Bruce D. Caulkins, Ram N. Mohapatra, Manish Kumar 0003 |
Review and insight on the behavioral aspects of cybersecurity. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque |
Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström |
Automating threat modeling using an ontology framework. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yuanzhao Song, Haowen Tan |
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Petar Radanliev, David De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos 0002, La Treall Maddox, Pete Burnap |
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Samar Muslah Albladi, George R. S. Weir |
Predicting individuals' vulnerability to social engineering in social networks. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye, Obeten O. Ekabua |
Conceptualisation of Cyberattack prediction with deep learning. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard |
Malware Guard Extension: abusing Intel SGX to conceal cache attacks. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hui Xu 0009, Yangfan Zhou, Jiang Ming 0002, Michael R. Lyu |
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sudhakar, Sushil Kumar 0001 |
An emerging threat Fileless malware: a survey and research challenges. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fangli Ren, Zhengwei Jiang, Xuren Wang, Jian Liu |
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yiwen Gao 0001, Yongbin Zhou, Wei Cheng 0003 |
Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Serafeim P. Moustakidis, Patrik Karlsson |
A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lili Xu, Mingjie Xu, Feng Li, Wei Huo |
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mohith Gowda HR, Adithya MV, Gunesh Prasad S, Vinay S |
Development of anti-phishing browser based on random forest and rule of extraction framework. |
Cybersecur. |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ahmet Okutan, Shanchieh Jay Yang |
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yuejun Liu, Rui Zhang 0002, Yongbin Zhou |
Predicate encryption against master-key tampering attacks. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Xiayang Wang, Fuqian Huang, Haibo Chen 0001 |
DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon Parkinson, Saad Khan 0001, James Bray, Daiyaan Shreef |
Creeper: a tool for detecting permission creep in file system access controls. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yiru Sun, Yanyan Liu, Bo Wu |
An efficient full dynamic group signature scheme over ring. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ansam Khraisat, Iqbal Gondal, Peter Vamplew 0001, Joarder Kamruzzaman |
Survey of intrusion detection systems: techniques, datasets and challenges. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yan Wang, Wei Wu, Chao Zhang 0008, Xinyu Xing, Xiaorui Gong, Wei Zou |
From proof-of-concept to exploitable. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Li Yang, Hua Dong, Zhao Li |
One-way information reconciliation schemes of quantum key distribution. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Zhihao Wang, Hong Li 0004, Qiang Li 0007, Wei Li 0059, Hongsong Zhu, Limin Sun |
Towards IP geolocation with intermediate routers based on topology discovery. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Charles Morisset, Tim A. C. Willemse, Nicola Zannone |
A framework for the extended evaluation of ABAC policies. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yanyan Liu, Daode Zhang, Yi Deng 0002, Bao Li 0001 |
(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Chaoqun Ma, Xiaolin Kong, Qiujun Lan, Zhongding Zhou |
The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Naveen Kumar 0011, Anish Mathuria |
Comprehensive evaluation of key management hierarchies for outsourced data. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Manfred Vielberth, Florian Menges, Günther Pernul |
Human-as-a-security-sensor for harvesting threat intelligence. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Noora Hashim Alallaq, Muhmmad Al-Khiza'ay, Xin Han |
Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shengye Wan, Yue Li 0002, Kun Sun 0001 |
PathMarker: protecting web contents against inside crawlers. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Li 0006, Dongpeng Xu 0001, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming Gu, Qianxiang Zeng |
Memory access integrity: detecting fine-grained memory access errors in binary code. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Marco Benedetti, Marco Mori |
On the use of Max-SAT and PDDL in RBAC maintenance. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Kanchana Devi V., Ganesan R. |
Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS). |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Pietro Colombo, Elena Ferrari |
Access control technologies for Big Data management systems: literature review and future trends. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Manar Alohaly, Hassan Takabi, Eduardo Blanco 0002 |
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Qingfeng Chen, Xu Zhang, Ruchang Zhang |
Privacy-preserving decision tree for epistasis detection. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tong Chen 0007, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han |
Adversarial attack and defense in reinforcement learning-from AI security view. |
Cybersecur. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Qionglu Zhang, Shijie Jia 0001, Bing Chang, Bo Chen |
Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ziqi Yang, Zhenkai Liang |
Automated identification of sensitive data from implicit user specification. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Qianqian Zhao, Kai Chen 0012, Tongxin Li, Yi Yang, XiaoFeng Wang 0001 |
Detecting telecommunication fraud by understanding the contents of a call. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zhenbin Yan 0001, Yi Deng 0002, Yiru Sun |
Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng |
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Biao Wang, Xueqing Wang, Rui Xue 0001 |
CCA1 secure FHE from PIO, revisited. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Guozhu Meng, Ruitao Feng, Guangdong Bai, Kai Chen 0012, Yang Liu 0003 |
DroidEcho: an in-depth dissection of malicious behaviors in Android applications. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Böhm, Florian Menges, Günther Pernul |
Graph-based visual analytics for cyber threat intelligence. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ahmet Okutan, Gordon Werner, Shanchieh Jay Yang, Katie McConky |
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jixin Zhang, Kehuan Zhang, Zheng Qin 0001, Hui Yin, Qixin Wu |
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang 0001, Shuang Hao, Raheem Beyah |
Cloud repository as a malicious service: challenge, identification and implication. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jun Li 0001, Bodong Zhao, Chao Zhang 0008 |
Fuzzing: a survey. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Dan Meng, Rui Hou 0001, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu 0005 |
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ping Chen 0003, Zhisheng Hu, Jun Xu 0024, Minghui Zhu, Peng Liu 0005 |
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chen Tian 0004, Yazhe Wang, Peng Liu 0005, Qihui Zhou, Chengyi Zhang |
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lu Sun, Mingtian Tan, Zhe Zhou 0001 |
A survey of practical adversarial example attacks. |
Cybersecur. |
2018 |
DBLP DOI BibTeX RDF |
|