共 43 条
- [21] Liang F, 2020, IEEE INTERNET THINGS, V7, P4329, DOI [10.1109/JIOT.2019.2963635, 10.1109/jiot.2019.2963635]
- [22] Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly [J]. IEEE ACCESS, 2019, 7 : 158126 - 158147
- [23] Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 273 - 294
- [25] Trojaning Attack on Neural Networks [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
- [26] Lyu X., 2023, P 37 AAAI C ART INT
- [27] McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
- [28] Deep Learning for IoT Big Data and Streaming Analytics: A Survey [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2923 - 2960
- [29] Data Poisoning in Sequential and Parallel Federated Learning* [J]. PROCEEDINGS OF THE 2022 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '22), 2022, : 24 - 34
- [30] Pillutla K, 2022, Arxiv, DOI arXiv:1912.13445