Telecommunications Science ›› 2023, Vol. 39 ›› Issue (7): 46-58.doi: 10.11959/j.issn.1000-0801.2023140
• Research and Development • Previous Articles Next Articles
Qimeng HUANG1,2, Miaomiao WU1,2, Yun LI1,2
Revised:
2023-07-02
Online:
2023-07-20
Published:
2023-07-01
Supported by:
CLC Number:
Qimeng HUANG, Miaomiao WU, Yun LI. Research on filter-based adversarial feature selection against evasion attacks[J]. Telecommunications Science, 2023, 39(7): 46-58.
[1] | PUGH K . Attacks on linking revisited:a new look at Bion’s classic work[J]. The International Journal of Psychoanalysis, 2020,101(2): 402-406. |
[2] | SHEN M , YU H , ZHU L H ,et al. Effective and robust physical-world attacks on deep learning face recognition systems[J]. IEEE Transactions on Information Forensics and Security, 2021(16): 4063-4077. |
[3] | RAO S , VERMA A K , BHATIA T . A review on social spam detection:challenges,open issues,and future directions[J]. Expert Systems With Applications, 2021(186): 115742. |
[4] | SALMAN E H , TAHER M A , HAMMADI Y I ,et al. An anomaly intrusion detection for high-density Internet of things wireless communication network based deep learning algorithms[J]. Sensors (Basel,Switzerland), 2022,23(1): 206. |
[5] | HANG J , HAN K J , CHEN H ,et al. Ensemble adversarial black-box attacks against deep learning systems[J]. Pattern Recognition, 2020,101:107184. |
[6] | SELVAGANAPATHY S G , SADASIVAM S . Defense against adversarial malware using robust classifier:dam-ROC[J]. Sādhanā, 2022,47(4): 209. |
[7] | ZHANG F , CHAN P P K , BIGGIO B ,et al. Adversarial feature selection against evasion attacks[J]. IEEE Transactions on Cybernetics, 2016,46(3): 766-777. |
[8] | QIAN C , YU Y , ZHOU Z H . Subset selection by Pareto optimization[C]// Proceedings of the 28th International Conference on Neural Information Processing Systems. Cambridge:MIT Press, 2015: 1774-1782. |
[9] | 钱超, 周志华 . 基于分解策略的多目标演化子集选择算法[J]. 中国科学(信息科学), 2016,46(9): 1276-1287. |
QIAN C , ZHOU Z H . Decomposition-based Pareto optimization for subset selection[J]. Scientia Sinica (Informationis), 2016,46(9): 1276-1287. | |
[10] | QIAN C , BIAN C , FENG C . Subset selection by Pareto optimization with recombination[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2020,34(3): 2408-2415. |
[11] | WU M M , LI Y . Adversarial mRMR against evasion attacks[C]// Proceedings of 2018 International Joint Conference on Neural Networks (IJCNN). Piscataway:IEEE Press, 2018: 1-6. |
[12] | PENG H C , LONG F H , DING C . Feature selection based on mutual information:criteria of max-dependency,max-relevance,and Min-redundancy[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005,27(8): 1226-1238. |
[13] | CORMACK G V . TREC 2007 spam track overview[C]// Proceedings of the 16th Text REtrieval Conference.[S.l.:s.n.], 2007. |
[14] | BIGGIO B , PILLAI I , BULò S R ,et al. Is data clustering in adversarial settings secure?[C]// Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security. New York:ACM Press, 2013: 87-98. |
[15] | RO?KOVá V GEORGE E I . The spike-and-slab LASSO[J]. Journal of the American Statistical Association, 2018,113(521): 431-444. |
[1] | Bensheng YUN, Xiaoya GAN, Yaguan QIAN. A network traffic classification method based on random forest and improved convolutional neural network [J]. Telecommunications Science, 2023, 39(7): 80-89. |
[2] | Xuefeng ZHOU, Qiang XU, Yanting TAN, Jiayi LANG, Hang JING, Zhiqiang ZHAO. Cloud architecture data center network abnormal traffic filtering algorithm based on improved grey clustering algorithm [J]. Telecommunications Science, 2023, 39(7): 90-98. |
[3] | Wenlei GUO. Optimization model of random load balancing of heterogeneous nodes in complex buildings [J]. Telecommunications Science, 2023, 39(7): 139-148. |
[4] | Guqiao ZHU, Chao JIANG, Yuye XU. Super-resolution reconstruction technology and its application on intelligent terminal device [J]. Telecommunications Science, 2023, 39(7): 156-165. |
[5] | Kaihui GAO, Dan LI. Data center networks with performance guarantee: a survey [J]. Telecommunications Science, 2023, 39(6): 1-21. |
[6] | Yu LI, Zhaozhao LI, Ping LYU, Qinrang LIU. Design on the full-dimensional reconfiguration polymorphic network switching chip architecture [J]. Telecommunications Science, 2023, 39(6): 22-32. |
[7] | Jiong LI, Yuxiang HU, Pengshuai CUI, Le TIAN, Yongji DONG. Research on incremental deployment mechanism of network modality for polymorphic network environment [J]. Telecommunications Science, 2023, 39(6): 33-43. |
[8] | Zehua GUO, Haowen ZHU, Tongwen XU. Network modal innovation for distributed machine learning [J]. Telecommunications Science, 2023, 39(6): 44-51. |
[9] | Aihua LIU, Hanguang LUO, Jianzhong WEN, Zhiguo ZHAN. Research on isolated-forwarding technology oriented polymorphic network [J]. Telecommunications Science, 2023, 39(6): 52-60. |
[10] | Tao ZOU, Huifeng ZHANG, Wanxin GAO, Qi XU, Congqi SHEN, Jun ZHU, Zhongxia PAN, Xingchang GUO. Research on polymorphic network application technology oriented intelligent manufacturing [J]. Telecommunications Science, 2023, 39(6): 61-72. |
[11] | Yaoyu HE, Chao ZHANG. Airworthiness analysis of low earth orbit satellite communication technology for UAV application [J]. Telecommunications Science, 2023, 39(6): 96-104. |
[12] | . [J]. Telecommunications Science, 2023, 39(Z1): 39-46. |
[13] | . [J]. Telecommunications Science, 2023, 39(Z1): 47-54. |
[14] | . [J]. Telecommunications Science, 2023, 39(Z1): 62-70. |
[15] | . [J]. Telecommunications Science, 2023, 39(Z1): 79-85. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|