共 205 条
[1]
Abdullah H, 2021, P IEEE S SECUR PRIV, P730, DOI 10.1109/SP40001.2021.00014
[2]
Al-Dujaili A., 2019, International Conference on Machine Learning
[3]
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
[J].
PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'19),
2019,
:1111-1119
[4]
Andriushchenko Maksym, 2020, Computer Vision - ECCV 2020. 16th European Conference. Proceedings. Lecture Notes in Computer Science (LNCS 12368), P484, DOI 10.1007/978-3-030-58592-1_29
[5]
[Anonymous], 2009, CIFAR-100 Dataset
[6]
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
[J].
2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML,
2023,
:339-364
[7]
Bai Y., 2020, EUROPEAN C COMPUTER
[8]
Baluja S, 2017, Arxiv, DOI arXiv:1703.09387
[9]
Bhagoji A. N., 2018, European Conference on Computer Vision
[10]
Bhambri S, 2020, Arxiv, DOI [arXiv:1912.01667, DOI 10.48550/ARXIV.1912.01667]