共 50 条
[42]
Impossibility of Black-Box Simulation Against Leakage Attacks
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:130-149
[43]
Practical Black-Box Attacks against Machine Learning
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:506-519
[45]
Boosting Black-Box Adversarial Attacks with Meta Learning
[J].
2022 41ST CHINESE CONTROL CONFERENCE (CCC),
2022,
:7308-7313
[47]
Curls & Whey: Boosting Black-Box Adversarial Attacks
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:6512-6520
[48]
Reverse Attack: Black-box Attacks on Collaborative Recommendation
[J].
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:51-68
[49]
Knowledge-enhanced Black-box Attacks for Recommendations
[J].
PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022,
2022,
:108-117
[50]
Boundary Defense Against Black-box Adversarial Attacks
[J].
2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR),
2022,
:2349-2356