- Document15. Adversarial Attacks and Defenses in Deep Learning From a Perspective of Cybersecurityuploaded byAndi Novianto
- Document14. Adversarial Attack Detection Framework Based on Optimized Weighted Conditional Stepwise Adversarial Networkuploaded byAndi Novianto
- Document9. IMaler an Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learninguploaded byAndi Novianto
- Document14. Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial networkuploaded byAndi Novianto
- Document9. IMaler_An_Adversarial_Attack_Framework_to_Obfuscate_Malware_Structure_Against_DGCNN-Based_Classifier_via_Reinforcement_Learninguploaded byAndi Novianto
- DocumentLandasan teori strategi distribusiuploaded byAndi Novianto
- Document11-Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networksuploaded byAndi Novianto
- Document231284504uploaded byAndi Novianto
- DocumentBAB IIuploaded byAndi Novianto