Research Article

Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection

Figure 3

The generation process of a modified sample.