Peng, H., Yu, Z., Zhao, D., Ding, Z., Yang, J., Zhang, B., . . . Zhong, M. Evading control flow graph based GNN malware detectors via active opcode insertion method with maliciousness preserving. Nature Portfolio.
Chicago Style (17th ed.) CitationPeng, Hao, et al. Evading Control Flow Graph Based GNN Malware Detectors via Active Opcode Insertion Method with Maliciousness Preserving. Nature Portfolio.
MLA (9th ed.) CitationPeng, Hao, et al. Evading Control Flow Graph Based GNN Malware Detectors via Active Opcode Insertion Method with Maliciousness Preserving. Nature Portfolio.
Warning: These citations may not always be 100% accurate.