共 233 条
[31]
Carlini N., 2019, ARXIV190206705
[32]
Carlini N., 2019, COMPLETE LIST ALL AR
[33]
Evading Deepfake-Image Detectors with White- and Black-Box Attacks
[J].
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2020),
2020,
:2804-2813
[34]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[35]
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:1-7
[36]
Reading Wikipedia to Answer Open-Domain Questions
[J].
PROCEEDINGS OF THE 55TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2017), VOL 1,
2017,
:1870-1879
[37]
Chen L., 2020, P ACL, P8801
[38]
Enhanced LSTM for Natural Language Inference
[J].
PROCEEDINGS OF THE 55TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2017), VOL 1,
2017,
:1657-1668
[39]
Chen ZY, 2020, 58TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2020), P183
[40]
Cheng MH, 2020, AAAI CONF ARTIF INTE, V34, P3601