共 42 条
[1]
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:121-140
[2]
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[3]
Cohen G, 2017, IEEE IJCNN, P2921, DOI 10.1109/IJCNN.2017.7966217
[4]
Fan LX, 2019, ADV NEUR IN, V32
[5]
Frosst N., 2019, P INT C MACH LEARN, P2012
[6]
BadNets: Evaluating Backdooring Attacks on Deep Neural Networks
[J].
IEEE ACCESS,
2019, 7
:47230-47244
[7]
He K, 2016, Proceedings of the IEEE conference on computer vision and pattern recognition, DOI [DOI 10.1109/CVPR.2016.90, 10.1109/CVPR.2016.90]
[8]
He Xuanli, 2022, P AAAI C ART INT
[9]
Hinton G., 2015, ARXIV