Login / Signup

Evolutionary computation as an artificial attacker: generating evasion attacks for detector vulnerability testing.

Hilmi Günes KayacikA. Nur Zincir-HeywoodMalcolm I. Heywood
Published in: Evol. Intell. (2011)
Keyphrases