共 35 条
[21]
DeepFool: a simple and accurate method to fool deep neural networks
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:2574-2582
[22]
Practical Black-Box Attacks against Machine Learning
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:506-519
[23]
The Limitations of Deep Learning in Adversarial Settings
[J].
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY,
2016,
:372-387
[24]
Saha A, 2020, AAAI CONF ARTIF INTE, V34, P11957
[26]
Szegedy C, 2014, Arxiv, DOI [arXiv:1312.6199, DOI 10.1109/CVPR.2015.7298594]
[27]
Tramèr F, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P601
[28]
Tran B, 2018, ADV NEUR IN, V31
[29]
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:707-723
[30]
Wang YJ, 2019, INT CONF ACOUST SPEE, P8063, DOI [10.1109/ICASSP.2019.8682578, 10.1109/icassp.2019.8682578]