[1] |
JIANG H , NAGRA J , AHAMMAD P . Sok:applying machine learning in security-a survey[J]. arXiv preprint arXiv:1611.03186, 2016
|
[2] |
PITROPAKIS N , PANAOUSIS E , GIANNETSOS T ,et al. A taxonomy and survey of attacks against machine learning[J]. Computer Science Review, 2019,34100199.
|
[3] |
张东, 张尧, 刘刚 ,等. 基于机器学习算法的主机恶意代码检测技术研究[J]. 网络与信息安全学报, 2017,3(7): 25-32.
|
|
ZHANG D , ZHANG Y , LIU G ,et al. Research on host malcode detection using machine learning[J]. Chinese Journal of Network and Information Security, 2017,3(7): 25-32.
|
[4] |
张骁敏, 刘静, 庄俊玺 ,等. 基于权限与行为的 Android 恶意软件检测研究[J]. 网络与信息安全学报, 2017,3(3): 51-57.
|
|
ZHANG X M , LIU J , ZHUANG J X ,et al. Research on Android malware detection based on permission and behavior[J]. Chinese Journal of Network and Information Security, 2017,3(3): 51-57.
|
[5] |
SZEGEDY C , ZAREMBA W , SUTSKEVER I ,et al. Intriguing properties of neural networks[J]. arXiv preprint arXiv:1312.6199, 2013
|
[6] |
GOODFELLOW I J , SHLENS J , SZEGEDY C . Explaining and harnessing adversarial examples[J]. arXiv preprint arXiv:1412.6572, 2014
|
[7] |
ZHANG G , YAN C , JI X ,et al. Dolphinattack:inaudible voice commands[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 103-117.
|
[8] |
GROSSE K , PAPERNOT N , MANOHARAN P ,et al. Adversarial perturbations against deep neural networks for malware classification[J]. arXiv preprint arXiv:1606.04435, 2016
|
[9] |
CHEN S , XUE M , FAN L ,et al. Automated poisoning attacks and defenses in malware detection systems:an adversarial machine learning approach[J]. Computers & Security, 2018,73: 326-344.
|
[10] |
PAPERNOT N , MCDANIEL P , WU X ,et al. Distillation as a defense to adversarial perturbations against deep neural networks[C]// 2016 IEEE Symposium on Security and Privacy (SP). 2016: 582-597.
|
[11] |
CARLINI N , WAGNER D . Towards evaluating the robustness of neural networks[C]// 2017 IEEE Symposium on Security and Privacy (SP). 2017: 39-57.
|
[12] |
蔡桂林, 王宝生, 王天佐 ,等. 移动目标防御技术研究进展[J]. 计算机研究与发展, 2016,53(5): 968-987.
|
|
CAI G L , WANG B S , WANG T Z ,et al. Research and development of moving target defense technology[J]. Journal of Computer Research and Development, 2016,53(5): 968-987.
|
[13] |
EVANS D,NGUYEN-TUONG A , KNIGHT J . Effectiveness of moving target defenses[M]// Moving Target Defense. 2011: 29-48.
|
[14] |
JAFARIAN J H , AL-SHAER E , DUAN Q . Openflow random host mutation:transparent moving target defense using software defined networking[C]// The First Workshop on Hot Topics in Software Defined Networks. 2012: 127-132.
|
[15] |
SENGUPTA S , CHAKRABORTI T , KAMBHAMPATI S . MTDeep:boosting the security of deep neural nets against adversarial attacks with moving target defense[C]// Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence. 2018.
|
[16] |
LEI C , MA D H , ZHANG H Q . Optimal strategy selection for moving target defense based on Markov game[J]. IEEE Access, 2017,5: 156-169.
|
[17] |
ROY A , CHHABRA A , KAMHOUA C A ,et al. A moving target defense against adversarial machine learning[C]// The 4th ACM/IEEE Symposium on Edge Computing. 2019: 383-388.
|
[18] |
李亚龙, 陈勤, 张旻 . 基于博弈论的移动目标最优防御策略研究[J]. 计算机工程与应用, 2019,55(19): 141-146.
|
|
LI Y L , CHEN Q , ZHANG M . Research on optimal defense strategy of moving targets based on game theory[J]. Computer Engineering and Applications, 2019,55(19): 141-146.
|
[19] |
KANTCHELIAN A , TYGAR J D , JOSEPH A . Evasion and hardening of tree ensemble classifiers[C]// International Conference on Machine Learning. 2016: 2387-2396.
|
[20] |
NISSIM N , COHEN A , GLEZER C ,et al. Detection of malicious PDF files and directions for enhancements:a state-of-the art survey[J]. Computers & Security, 2015,48: 246-266.
|
[21] |
CHEN P Y , ZHANG H , SHARMA Y ,et al. Zoo:zeroth order optimization based black-box attacks to deep neural networks without training substitute models[C]// The 10th ACM Workshop on Artificial Intelligence and Security. 2017: 15-26.
|
[22] |
MU?OZ-GONZáLEZ L , BIGGIO B , DEMONTIS A ,et al. Towards poisoning of deep learning algorithms with back-gradient optimization[C]// The 10th ACM Workshop on Artificial Intelligence and Security. 2017: 27-38.
|