Author of the publication

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.

, , , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 268-284. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods for Detecting XSS Attacks Based on BERT and BiLSTM., , , and . ICMSS, page 1-7. IEEE, (2024)Attack detection model for BCoT based on contrastive variational autoencoder and metric learning., , , , , , and . J. Cloud Comput., 13 (1): 125 (December 2024)Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus., , , , and . Int. J. Pattern Recognit. Artif. Intell., 33 (14): 1955015:1-1955015:15 (2019)Research on information steganography based on network data stream., , , , , and . Neural Comput. Appl., 33 (3): 851-866 (2021)Confidential information protection method of commercial information physical system based on edge computing., , and . Neural Comput. Appl., 33 (3): 897-907 (2021)HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization., , , , , , and . Neural Networks, (2024)Moving target defense controller of mobile system based on Openflow sensor security scheme., and . Comput. Commun., (2020)具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate)., , , , and . 计算机科学, 45 (7): 135-138 (2018)An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning., , , , , and . Secur. Commun. Networks, (2019)Integrating Traffics with Network Device Logs for Anomaly Detection., , , , , , and . Secur. Commun. Networks, (2019)