共 29 条
[1]
GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
[J].
PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'19),
2019,
:1111-1119
[2]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[4]
Dutta S., 2021, AISC, V1170, P97, DOI 10.1007/978-981-15-5411
[5]
Robust Physical-World Attacks on Deep Learning Visual Classification
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:1625-1634
[6]
Goodfellow I. J., 2015, ICLR
[7]
Poster: Nickel to Lego: Using Foolgle to Create Adversarial Examples to fool Google Cloud Speech-to-Text API
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:2593-2595
[8]
Knight JC, 2002, ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P547, DOI 10.1109/ICSE.2002.1007998
[10]
"Know What You Know": Predicting Behavior for Learning-Enabled Systems When Facing Uncertainty
[J].
2021 INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2021),
2021,
:78-89