共 50 条
[31]
Beyond the black-box model
[J].
FOUNDATIONS AND TRENDS IN MACHINE LEARNING,
2015, 8 (3-4)
:309-328
[32]
Toward Black-box Image Extraction Attacks on RBF SVM Classification Model
[J].
2020 IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2020),
2020,
:394-399
[33]
Partial Retraining Substitute Model for Query-Limited Black-Box Attacks
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (20)
:1-19
[34]
AdvMind: Inferring Adversary Intent of Black-Box Attacks
[J].
KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING,
2020,
:1899-1907
[35]
Black-box Adversarial Attacks in Autonomous Vehicle Technology
[J].
2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA,
2020,
[36]
Black-box Adversarial Attacks on Video Recognition Models
[J].
PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA (MM'19),
2019,
:864-872
[37]
GeoDA: a geometric framework for black-box adversarial attacks
[J].
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2020),
2020,
:8443-8452
[40]
Impossibility of Black-Box Simulation Against Leakage Attacks
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:130-149