共 45 条
[1]
Aghakhani H., 2020, Computing Research Repository (CoRR)
[3]
Amazon, 2022, Amazon SageMaker
[4]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[5]
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:1-7
[6]
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:694-711
[7]
Chen XY, 2017, Arxiv, DOI arXiv:1712.05526
[8]
de Andrade DC, 2018, Arxiv, DOI arXiv:1808.08929
[10]
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks
[J].
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA),
2019,
:113-125