共 67 条
[31]
Gao DB, 2008, LECT NOTES COMPUT SC, V5308, P238
[32]
GARCIA M Miguez., 2012, O Risco de Comer uma Sopa e Outros Casos de Direito Penal: Elementos da Parte Geral, I, V2, P1
[33]
Goel S, 2006, ELECTRON J PROBAB, V11
[34]
Hardy W., 2016, P INT C DAT MIN STEE, P61
[35]
Huang F, 2016, ACTA POLYM SIN, P399
[36]
Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV),
2015,
:1026-1034
[37]
Kalash M, 2018, INT CONF NEW TECHNOL
[38]
Determining malicious executable distinguishing attributes and low-complexity detection
[J].
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2011, 7 (02)
:95-105
[39]
Kingma D. P., 2015, P INT C LEARN REPR, P1
[40]
Kirat Dhilung, 2013, P ANN COMP SEC APPL, P89