共 14 条
[1]
Software Engineering for Machine Learning: A Case Study
[J].
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE (ICSE-SEIP 2019),
2019,
:291-300
[2]
[Anonymous], Common Weakness Enumeration
[3]
ATT&CK Threat Database, About us
[4]
Bughin J., 2018, MCKINSEY GLOBAL I, V1, P3
[5]
Fazelnia M., 2021, PROC 9 INT C LEARNIN
[6]
Haney JM, 2021, INF COMPUT SECUR, V29, P485, DOI [10.1108/ICS-08-2020-0131, 10.1108/ics-08-2020-0131]
[7]
Huang L., 2011, ACM WORKSHOP SECURIT, P43, DOI [DOI 10.1145/2046684.2046692, 10.1145/2046684.2046692]
[8]
Jia SS, 2018, 2018 IEEE SYMPOSIUM ON PRODUCT COMPLIANCE ENGINEERING - ASIA 2018 (IEEE ISPCE-CN 2018), P94
[9]
Kitchenham B., 2004, PROCEDURES PERFORMIN, V33, P28, DOI DOI 10.5144/0256-4947.2017.79
[10]
The Limitations of Deep Learning in Adversarial Settings
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:372-387