共 20 条
[1]
Agoyan Michel, 2010, 2010 IEEE 16th International On-Line Testing Symposium (IOLTS 2010), P235, DOI 10.1109/IOLTS.2010.5560194
[2]
[Anonymous], 2015, PROC INT C LEARNING
[3]
Athalye A, 2018, PR MACH LEARN RES, V80
[4]
POSTER: Practical Fault Attack on Deep Neural Networks
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:2204-2206
[5]
Carlini N, 2019, Arxiv, DOI arXiv:1902.06705
[6]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[7]
Carlini N, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P3, DOI 10.1145/3128572.3140444
[8]
Leveraging Noise and Aggressive Quantization of In-Memory Computing for Robust DNN Hardware Against Adversarial Input and Weight Attacks
[J].
2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2021,
:559-564
[9]
Dumont Mathieu, 2021, 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), P616, DOI 10.1109/WF-IoT51360.2021.9595075
[10]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778