导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Control Flow Transformation Based Adversarial Example Generation for Attacking Malware Detection GNN Model
LI Yixuan, JIA Peng, FAN Ximing, CHEN Chen
Netinfo Security . 2024, (
12
): 1896 -1910 . DOI: 10.3969/j.issn.1671-1122.2024.12.008