共 59 条
[1]
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:1250-1255
[2]
Aditya K, 2019, 18 IEEE INT C TRUST
[3]
Adversarial Deep Learning for Robust Detection of Binary Encoded Malware
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:76-82
[4]
Anderson Hyrum S, 2017, BLACK HAT
[5]
[Anonymous], 2017, ARXIV171208713
[6]
[Anonymous], 2018, ABS181102054 ARXIV
[7]
Barreno M, 2006, P 2006 ACM S INF COM, P16
[8]
Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms
[J].
COMPUTER VISION - ECCV 2018, PT XII,
2018, 11216
:158-174
[10]
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
[J].
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016,
2016, 10018
:141-152