Evading Provenance-Based ML Detectors with Adversarial System Actions
machine-learning
system-security
adversarial-examples
provenance-analysis
adversarial-attacks
graph-neural-networks
-
Updated
Aug 18, 2024 - Python