CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.
Xiaoyi DongWeiming ZhangNenghai YuPublished in: CoRR (2018)
Keyphrases
- black box
- black boxes
- white box
- multi agent
- computer networks
- access control
- test cases
- network structure
- peer to peer
- rule extraction
- ddos attacks
- denial of service attacks
- white box testing
- database
- state transition
- attack graphs
- countermeasures
- integration testing
- dos attacks
- network traffic
- relational databases
- case study