共 97 条
- [1] Silver D, Huang A, Maddison CJ, Et al., Mastering the game of Go with deep neural networks and tree search, Nature, 529, 7587, pp. 484-489, (2016)
- [2] Dalvi N, Domingos P, Sanghai S, Verma D, Et al., Adversarial classification, Proc. of the 10th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, pp. 99-108, (2004)
- [3] Lowd D, Meek C., Adversarial learning, Proc. of the 11th ACM Sigkdd Int'l Conf. on Knowledge Discovery in Data Mining, (2005)
- [4] Kearns MJ, Li M., Learning in the presence of malicious errors, SIAM Journal on Computing, 22, 4, pp. 807-837, (1993)
- [5] Szegedy C, Zaremba W, Sutskever I, Et al., Intriguing properties of neural networks, Proc. of the Int'l Conf. on Learning Representations, (2014)
- [6] Carlini N, Wagner D., Towards evaluating the robustness of neural networks, Proc. of the IEEE Symp. on Security and Privacy (SP), pp. 39-57, (2017)
- [7] Papernot N, Mcdaniel P, Sinha A, Et al., SoK: Security and privacy in machine learning, Proc. of the IEEE European Symp. on Security and Privacy, pp. 399-414, (2018)
- [8] Papernot N, Mcdaniel PD, Jha S, Et al., The limitations of deep learning in adversarial settings, Proc. of the IEEE European Symp. on Security and Privacy, pp. 372-387, (2016)
- [9] Song L, Ma CG, Duan GH., Machine learning security and privacy: A survey, Chinese Journal of Network and Information Security, 4, 8, pp. 1-11, (2018)
- [10] Kurakin A, Goodfellow IJ, Bengio S, Et al., Adversarial machine learning at scale, Proc. of the Int'l Conf. on Learning Representations, (2017)