Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System.
Xiaokang ZhouWei LiangWeimin LiKe YanShohei ShimizuKevin I-Kai WangPublished in: IEEE Internet Things J. (2022)
Keyphrases
- management system
- security problems
- countermeasures
- neural network
- directed graph
- graph representation
- graph theory
- graph structure
- random walk
- multi agent
- graph theoretic
- graph model
- graph mining
- weighted graph
- bipartite graph
- graph matching
- big data
- graph databases
- hierarchical structure
- cloud computing
- watermarking scheme
- spanning tree
- connected components
- structured data
- security protocols
- security risks