Research Article

A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification

Figure 2

Attack and defense scenario.