共 17 条
- [1] [Anonymous], 2018, ARXIV181100701
- [2] Glorot X., 2010, P 13 INT C ART INT S, V9, P249
- [3] Gong Z., 2017, ARXIV170404960
- [4] Goodfellow I J, 2015, P INT C LEARN REPR I
- [5] LEMNA: Explaining Deep Learning based Security Applications [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 364 - 379
- [6] Hodo E., 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC), P1, DOI [10.1109/ISNCC.2016.7746067, DOI 10.1109/ISNCC.2016.7746067]
- [7] Javaid A., 2016, P 9 EAI INT C BIOINS, V3, P2, DOI [DOI 10.4108/EAI.3-12-2015.2262516, 10.4108/eai.3-12-2015.2262516]
- [8] Klambauer G., 2017, Advances in Neural Information Processing Systems, V30, P972
- [9] KURAKIN A, 2017, ICLR WORKSH