共 37 条
[1]
Abou Khamis R, 2019, Arxiv, DOI arXiv:1910.14107
[2]
Alhajjar E, 2020, Arxiv, DOI arXiv:2004.11898
[3]
Biggio Battista, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P387, DOI 10.1007/978-3-642-40994-3_25
[4]
Biggio B., 2018, PATTERN RECOGN
[5]
Biggio B., 2012, arXiv
[6]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[7]
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[8]
Clements J, 2021, Arxiv, DOI arXiv:1903.11688
[9]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333
[10]
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672