F Li, Y Li, S Leng, Y Guo, K Geng,
Z Wang, L Fang - Computers & Security, 2020 - Elsevier
Multi-step attacks have been widely adopted by attackers, resulting in privacy leakage.
Although many cost-sensitive approaches have been proposed to respond to the multi-step …