共 13 条
[1]
Alzantot M., 2018, NIPS 2017 Machine Deception Workshop
[2]
Carlini N., 2018, P IEEE DEEP LEARN SE
[3]
Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513
[6]
Roy N, 2018, PROCEEDINGS OF THE 15TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'18), P547
[7]
Schonherr L., 2019, P ANN NETW DISTR SYS
[8]
Shiota Sayaka., 2016, ODYSSEY, V2016, P259
[9]
POSTER: Inaudible Voice Commands
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:2583-2585
[10]
Tavish V., 2015, P USENIX WORKSH OFF