共 33 条
- [1] Andriushchenko Maksym, 2020, Computer Vision - ECCV 2020. 16th European Conference. Proceedings. Lecture Notes in Computer Science (LNCS 12368), P484, DOI 10.1007/978-3-030-58592-1_29
- [2] Apruzzese G, 2022, Arxiv, DOI arXiv:2212.14315
- [3] Apruzzese G, 2018, 2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA)
- [4] Barreno M., 2006, P ACM S INF COMP COM, P16, DOI DOI 10.1145/1128817.1128824
- [6] Conti Mauro, 2022, arXiv
- [7] Davidson T, 2017, P INT AAAI C WEB SOC, P1, DOI [DOI 10.1609/ICWSM.V11I1.14955, 10.1609/icwsm.v11i1.14955]
- [8] Demontis A, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P321
- [9] Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4307 - 4316
- [10] Frid-Adar M, 2018, I S BIOMED IMAGING, P289, DOI 10.1109/ISBI.2018.8363576