A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models
Algorithm 2
Network flow adversarial example generate algorithm.
Input:,,,,,, where is the substitute model, is the target model, is the network flow data, is the iteration steps, is original label, and is the move step