Control Flow Transformation Based Adversarial Example Generation for Attacking Malware Detection GNN Model
LI Yixuan, JIA Peng, FAN Ximing, CHEN Chen
Netinfo Security . 2024, (12): 1896 -1910 .  DOI: 10.3969/j.issn.1671-1122.2024.12.008