共 10 条
[1]
Abadi M., 2015, PREPRINT
[2]
Alme C., 2012, U. S. Patent, Patent No. 8312546
[3]
[Anonymous], 2015, DEEP NEURAL NETWORKS
[4]
[Anonymous], J INFORM ASSURANCE S
[5]
An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
[J].
CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017,
2017, 10194
:56-67
[6]
Look and Think Twice: Capturing Top-Down Visual Attention with Feedback Convolutional Neural Networks
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV),
2015,
:2956-2964
[7]
Gavrilut Dragos, 2009, Proceedings of the 2009 International Multiconference on Computer Science and Information Technology (IMCSIT), P735, DOI 10.1109/IMCSIT.2009.5352759
[8]
Nataraj L, 2011, P 4 ACM WORKSH SEC A, P21, DOI [10.1145/2046684.2046689, DOI 10.1145/2046684.2046689]
[9]
Practical Black-Box Attacks against Machine Learning
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:506-519
[10]
Shlens J., 2014, PROC INT C LEARNING