共 50 条
- [2] A SURVEY ON VULNERABLE ATTACKS IN ONLINE SOCIAL NETWORKS INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
- [3] Certifiers Make Neural Networks Vulnerable to Availability Attacks PROCEEDINGS OF THE 16TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2023, 2023, : 67 - 78
- [4] Flooding attacks detection in traffic of backbone networks Proceedings - Conference on Local Computer Networks, LCN, 2011, : 441 - 449
- [6] POSTER: Traffic Analysis Attacks in Anonymity Networks PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 917 - 919
- [7] Flooding Attacks Detection in Traffic of Backbone Networks 2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 441 - 449
- [8] Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study 2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 8328 - 8333
- [10] Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study Proceedings of the IEEE Conference on Decision and Control, 2023, : 8328 - 8333