共 38 条
[1]
Alzantot M, 2018, 2018 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2018), P2890
[2]
Andersen D., 2018, ARLIV180706732
[3]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[4]
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1277-1294
[5]
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[6]
Ebrahimi J, 2018, PROCEEDINGS OF THE 56TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, VOL 2, P31
[7]
etal M. Abadi, 2016, TENSORFLOW LARGE SCA
[8]
Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:50-56
[9]
GLOROT X., 2011, INT C ARTIFICIAL INT, P315
[10]
Goodfellow I. J., 2014, 3 INT C LEARNING REP