共 38 条
[1]
[Anonymous], 2013, LNCS (LNAI), V8190, P387, DOI [10.1007/978-3-642-40994-325, DOI 10.1007/978-3-642-40994-325]
[2]
Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
[3]
Batina L, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P515
[4]
BCM+13 Biggio B., ECML PKDD
[5]
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[7]
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[8]
Chandrasekaran V., 2018, arXiv
[9]
Das A, 2020, PROCEEDINGS OF THE THIRTY-FIRST ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS (SODA'20), P398
[10]
Dowlin N, 2016, PR MACH LEARN RES, V48