no code implementations • 8 Mar 2021 • Qiumei Cheng, Shiying Zhou, Yi Shen, Dezhang Kong, Chunming Wu
To bypass the detection of NIDS, the generated network traffic and benign traffic are classified by a black-box NIDS.
Decision Making Image Generation +1 Cryptography and Security