共 19 条
[11]
Kamishima Toshihiro, 2012, Machine Learning and Knowledge Discovery in Databases. Proceedings of the European Conference (ECML PKDD 2012), P35, DOI 10.1007/978-3-642-33486-3_3
[12]
Application of majority voting to pattern recognition: An analysis of its behavior and performance
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
1997, 27 (05)
:553-568
[14]
Practical Black-Box Attacks against Machine Learning
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:506-519
[15]
Papernot N, 2016, IEEE MILIT COMMUN C, P49, DOI 10.1109/MILCOM.2016.7795300
[16]
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
[J].
PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17),
2017,
:1-18
[17]
University of Michigan, NOND POL NOT
[18]
Feature-Guided Black-Box Safety Testing of Deep Neural Networks
[J].
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2018, PT I,
2018, 10805
:408-426
[19]
Zafar MB, 2017, PR MACH LEARN RES, V54, P962