共 27 条
[6]
Bhattacharya S, 2012, I CONF SENS TECHNOL, P422, DOI 10.1109/ICSensT.2012.6461713
[7]
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Half-day Tutorial
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:2154-2156
[8]
Farrell-Poe K., 2005, Arizona Watershed Stewardship Guide: Water Quality & Monitoring, P1
[10]
GORCHEV HG, 1984, WHO CHRON, V38, P104