Article,

Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.

, , and .
Evol. Intell., 4 (4): 243-266 (2011)

Meta data

Tags

Users

  • @dblp

Comments and Reviews