共 53 条
[11]
Goodfellow I. J., 2014, INT C LEARNING REPRE
[12]
Adversarial Examples for Malware Detection
[J].
COMPUTER SECURITY - ESORICS 2017, PT II,
2017, 10493
:62-79
[13]
DLFuzz: Differential Fuzzing Testing of Deep Learning Systems
[J].
ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING,
2018,
:739-743
[14]
Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks?
[J].
PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20),
2020,
:851-862
[15]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[16]
Tran HD, 2019, LECT NOTES COMPUT SC, V11800, P670, DOI 10.1007/978-3-030-30942-8_39
[17]
Safety Verification of Deep Neural Networks
[J].
COMPUTER AIDED VERIFICATION, CAV 2017, PT I,
2017, 10426
:3-29
[18]
Huster Todd, 2019, ECML PKDD 2018 Workshops. Nemesis 2018, UrbReas 2018, SoGood 2018 IWAISe 2018, and Green Data Mining 2018. Proceedings: Lecture Notes in Artificial Intelligence (LNAI 11329), P16, DOI 10.1007/978-3-030-13453-2_2
[19]
Black-box Adversarial Attacks on Video Recognition Models
[J].
PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA (MM'19),
2019,
:864-872