共 32 条
- [1] Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
- [2] Learning Deep Architectures for AI [J]. FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01): : 1 - 127
- [3] Carlini N., 2017, ACM WORKSHOP ARTIFIC
- [4] Towards Evaluating the Robustness of Neural Networks [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
- [5] Audio Adversarial Examples: Targeted Attacks on Speech-to-Text [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 1 - 7
- [6] TOSS: Tailoring Online Server Systems through Binary Feature Customization [J]. FEAST'18: PROCEEDINGS OF THE 2018 WORKSHOP ON FORMING AN ECOSYSTEM AROUND SOFTWARE TRANSFORMATION, 2018, : 1 - 7
- [7] Eykholt K, 2018, Arxiv, DOI arXiv:1707.08945
- [8] Adversarial Examples for Malware Detection [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 62 - 79
- [9] LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis [J]. 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 57 - 68
- [10] Hosseini H., 2017, ARXIV