Defending against adversarial examples using defense kernel network.
Yuying HaoTuanhui LiYong JiangXuanye ChengLi LiPublished in: BMVC (2019)
Keyphrases
- ddos attacks
- network structure
- network model
- computer networks
- support vector
- kernel function
- feature selection
- communication networks
- network traffic
- peer to peer
- feature space
- neural network
- training examples
- complex networks
- kernel methods
- intrusion detection
- evaluation function
- bayesian networks
- distributed network