共 46 条
[1]
Ateniese Giuseppe, 2015, International Journal of Security and Networks, V10, P137
[2]
Balle B., 2022, arXiv
[3]
Biggio B., 2011, ASIAN C MACHINE LEAR, P97
[4]
Biggio Battista, 2012, ICML, DOI DOI 10.48550/ARXIV.1206.6389
[5]
Boenisch Franziska, 2021, CURIOUS ABANDON HONE
[6]
Carlini N, 2022, P IEEE S SECUR PRIV, P1897, DOI [10.1109/SP46214.2022.00090, 10.1109/SP46214.2022.9833649]
[7]
Carlini N, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2633
[8]
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[9]
Chen Xinyun, 2017, Targeted backdoor attacks on deep learning systems using data poisoning
[10]
Choquette-Choo C. A., 2021, P 38 INT C MACHINE L