The following publications are possibly variants of this publication:
- A Black-Box Adversarial Attack Method via Nesterov Accelerated Gradient and Rewiring Towards Attacking Graph Neural NetworksShu Zhao, Wenyu Wang, Ziwei Du, Jie Chen 0025, Zhen Duan. tbd, 9(6):1586-1597, December 2023. [doi]
- Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud EnvironmentsYanjiao Chen, Xueluan Gong, Qian Wang, Xing Di, Huayang Huang. network, 34(5):141-147, 2020. [doi]
- Theil-Based Countermeasure against Interest Flooding Attacks for Named Data NetworksRui Hou, Min Han, Jing Chen, Wenbin Hu, Xiaobin Tan, Jiangtao Luo, Maode Ma. network, 33(3):116-121, 2019. [doi]
- Imperceptible Adversarial Attack via Invertible Neural NetworksZihan Chen, Ziyue Wang, Jun-Jie Huang, Wentao Zhao, Xiao Liu 0031, Dejian Guan. AAAI 2023: 414-424 [doi]
- An AI-Enabled Framework to Defend Ingenious MDT-Based Attacks on the Emerging Zero Touch Cellular NetworksAneeqa Ijaz, Waseem Raza, Hasan Farooq, Marvin Manalastas, Ali Imran 0001. network, 38(1):228-237, January 2024. [doi]
- FDSFL: Filtering Defense Strategies toward Targeted Poisoning Attacks in IIoT-Based Federated Learning Networking SystemXiong Xiao, Zhuo Tang, Li Yang, Yingjie Song, Jiawei Tan, Kenli Li 0001. network, 37(4):153-160, July / August 2023. [doi]
- Collusion-Based Poisoning Attacks Against Blockchained Federated LearningXiaohui Zhang, Tao Shen 0004, Fenhua Bai, Chi Zhang. network, 37(6):50-57, November 2023. [doi]
- Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing ServicesYi Zhao 0011, Ke Xu, Haiyang Wang, Bo Li 0001, Ruoxi Jia. network, 35(1):163-169, 2021. [doi]
- A Security Evaluation Framework for Intelligent Connected Vehicles Based on Attack ChainsQi Li, Jinxin Zuo, Ruohan Cao, Yibo Zhang, Jianrui Chen, Qiang Liu 0030, Jingjing Wang 0001. network, 38(2):148-155, March 2024. [doi]