共 82 条
- [1] Agarwal A., 2016, arXiv, DOI DOI 10.48550/ARXIV.1603.04467
- [2] Agarwal C, 2019, IEEE IMAGE PROC, P3801, DOI [10.1109/ICIP.2019.8803601, 10.1109/icip.2019.8803601]
- [3] Athalye A, 2018, PR MACH LEARN RES, V80
- [4] Brown TB, 2018, Arxiv, DOI arXiv:1809.08352
- [5] Bai Y., 2021, 9 INT C LEARN REPR I
- [7] Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 278 - 287
- [8] Towards Evaluating the Robustness of Neural Networks [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
- [9] Audio Adversarial Examples: Targeted Attacks on Speech-to-Text [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 1 - 7