共 314 条
[1]
Abaid Z, 2017, 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), P375
[2]
Adam-Bourdarios C., 2014, P 2014 INT C HIGH EN, P19
[3]
VENOMAVE: Targeted Poisoning Against Speech Recognition
[J].
2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML,
2023,
:404-417
[4]
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
[J].
IEEE ACCESS,
2018, 6
:14410-14430
[5]
Alam M., 2019, P 56 ACM IEEE DES AU, P1
[6]
Triggerability of Backdoor Attacks in Multi-Source Transfer Learning-based Intrusion Detection
[J].
2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT,
2022,
:40-47
[7]
Ali H., 2023, IEEE Access, V11
[9]
[Anonymous], 2008, P 25 INT C MACH LEAR
[10]
Ashcraft C., 2021, arXiv, DOI DOI 10.48550/ARXIV.2106.07798