共 14 条
[1]
[Anonymous], 2017, ABS170501320 CORR
[2]
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:1-7
[3]
Dvijotham K, 2018, UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, P550
[4]
Garnett R., 2018, ADV NEURAL INFORM PR, P4790
[5]
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:3-18
[6]
Siamese Network Based Feature Learning for Improved Intrusion Detection
[J].
NEURAL INFORMATION PROCESSING (ICONIP 2019), PT I,
2019, 11953
:377-389
[7]
Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks
[J].
COMPUTER AIDED VERIFICATION, CAV 2017, PT I,
2017, 10426
:97-117
[8]
Khedher M.I., 2018, P 2018 INT JOINT C N, P1, DOI [10.1109/IJCNN.2018.8489111, DOI 10.1109/IJCNN.2018.8489111]
[9]
Lomuscio Alessio, 2017, ABS170607351 CORR
[10]
Raghunathan A., 2018, 6 INT C LEARN REPR I