共 42 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[3]
[Anonymous], 2019, ARXIV PREPRINT ARXIV
[4]
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[6]
Brendel W., 2018, ARXIV PREPRINT ARXIV
[7]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[8]
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:1-7
[9]
Carlini Nicholas, 2019, arXiv preprint arXiv:1902.06705
[10]
Chen PY, 2018, AAAI CONF ARTIF INTE, P10