共 331 条
[1]
Rusu AA, 2016, Arxiv, DOI [arXiv:1606.04671, DOI 10.43550/ARXIV:1606.04671, DOI 10.48550/ARXIV.1606.04671]
[2]
Abadi M., 2016, Learning to protect communications with adversarial neural cryptography, DOI DOI 10.48550/ARXIV.1610.06918
[3]
ACKLEY DH, 1985, COGNITIVE SCI, V9, P147
[4]
Adler J, 2018, ADV NEUR IN, V31
[5]
Detecting Deceptive Reviews using Generative Adversarial Networks
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:89-95
[6]
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
[J].
IEEE ACCESS,
2018, 6
:14410-14430
[7]
Plug & Play Generative Networks: Conditional Iterative Generation of Images in Latent Space
[J].
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017),
2017,
:3510-3520
[8]
[Anonymous], 2016, P ADV NEURAL INFORM
[9]
[Anonymous], 2018, P BRIT MACH VIS C NE
[10]
[Anonymous], 2016, ICLR, DOI DOI 10.48550/ARXIV.1605.09782