共 25 条
[1]
Agarwal O, 2021, COMPUT LINGUIST, V47, P117, DOI [10.1162/COLI_a_00397, 10.1162/coli_a_00397]
[2]
Devlin J, 2019, Arxiv, DOI [arXiv:1810.04805, DOI 10.48550/ARXIV.1810.04805]
[5]
LEMNA: Explaining Deep Learning based Security Applications
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:364-379
[7]
Jain S, 2019, Arxiv, DOI [arXiv:1902.10186, DOI 10.48550/ARXIV.1902.10186]
[8]
Kim Y, 2014, Arxiv, DOI [arXiv:1408.5882, 10.48550/ARXIV.1408.5882]
[9]
Li L, 2022, PROCEEDINGS OF THE THIRTY-FIRST INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2022, P5094
[10]
Liu H, 2019, Arxiv, DOI arXiv:1811.00196