Research Article
Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
| | Evaluation metrics | Formula |
| | The success rate of modified sample operation | | | The malicious function retention rate of modified samples | | | Evasion rate | |
|
|