共 13 条
[1]
[Anonymous], PERCENTAGE VULNERABI
[2]
[Anonymous], GOOGLE TENSORFLOW VU
[3]
[Anonymous], 2011, 20 USENIX SEC S USEN
[4]
Brundage M, 2018, Arxiv, DOI [arXiv:1802.07228, 10.48550/arXiv.1802.07228, DOI 10.48550/ARXIV.1802.07228]
[6]
Lee EA, 2008, ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, P363, DOI 10.1109/ISORC.2008.25
[7]
Lee N., 2015, Counterterrorism and Cybersecurity, P429
[8]
Trojaning Attack on Neural Networks
[J].
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018),
2018,
[9]
Miller C., 2013, DEF CON, V21, P260
[10]
A Study of Security Vulnerabilities on Docker Hub
[J].
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17),
2017,
:269-280