共 233 条
- [31] Boyd-Graber J, 2018, SPRING SER CHALLENGE, P169, DOI 10.1007/978-3-319-94042-7_9
- [32] C. A. team, 2018, TOXIC COMMENT CLASSI
- [33] Carlini N., 2019, ARXIV190206705
- [34] Carlini N., 2019, COMPLETE LIST ALL AR
- [35] Evading Deepfake-Image Detectors with White- and Black-Box Attacks [J]. 2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2020), 2020, : 2804 - 2813
- [36] Towards Evaluating the Robustness of Neural Networks [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
- [37] Audio Adversarial Examples: Targeted Attacks on Speech-to-Text [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 1 - 7
- [38] Reading Wikipedia to Answer Open-Domain Questions [J]. PROCEEDINGS OF THE 55TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2017), VOL 1, 2017, : 1870 - 1879
- [39] Chen L., 2020, P 58 ANN M ASS COMPU, P8801
- [40] Enhanced LSTM for Natural Language Inference [J]. PROCEEDINGS OF THE 55TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2017), VOL 1, 2017, : 1657 - 1668