共 118 条
- [11] Developing A Compelling Vision for Winning the Cybersecurity Arms Race [J]. PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 220 - 221
- [13] Bieringer L, 2022, PROCEEDINGS OF THE EIGHTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, SOUPS 2022, P97
- [14] Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Half-day Tutorial [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2154 - 2156
- [15] Bilge L., 2012, P ACM C COMP COMM SE, P833, DOI [10.1145/2382196.2382284, DOI 10.1145/2382196.2382284]
- [16] "I Never Thought About Securing My Machine Learning Systems": A Study of Security and Privacy Awareness of Machine Learning Practitioners [J]. MENSCH AND COMPUTER 2021 (MUC 21), 2021, : 520 - 546
- [17] Burcham Morgan, 2017, P HOT TOP SCI SEC S, P13
- [18] Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks [J]. IEEE ACCESS, 2022, 10 : 100267 - 100275
- [19] Chakraborty A, 2018, Arxiv, DOI arXiv:1810.00069
- [20] Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense [J]. 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 99 - 106