10.1007/s11590-023-02007-7">
 

Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems

Document Type

Article

Publication Date

5-23-2023

Comments

This article is published by Springer as cited, and is available to subscribers through the DOI link below.

Authors Marc Chalé & Nathaniel D. Bastian are co-affiliated with the Army Cyber Institute, United States Military Academy.

Source Publication

Optimization Letters (ISSN 1862-4472 | e-issn 1862-4480)

This document is currently not available here.

Share

COinS