共 40 条
[1]
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[3]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[4]
Chen HL, 2018, Arxiv, DOI arXiv:1804.03648
[5]
Chollet F., 2015, Keras
[6]
Xception: Deep Learning with Depthwise Separable Convolutions
[J].
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017),
2017,
:1800-1807
[7]
Howard AG, 2017, Arxiv, DOI [arXiv:1704.04861, DOI 10.48550/ARXIV.1704.04861, 10.48550/arXiv.1704.04861]
[8]
Goodfellow I.J., 2014, ABS14126572 CORR, DOI DOI 10.48550/ARXIV.1412.6572
[9]
Watermarking Deep Neural Networks for Embedded Systems
[J].
2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS,
2018,
[10]
Han S, 2015, ADV NEUR IN, V28