共 24 条
[1]
Ahmadi M, 2018, ABS180210135 CORR
[2]
[Anonymous], KERAS BLOG
[3]
Athiwaratkun B, 2017, INT CONF ACOUST SPEE, P2482, DOI 10.1109/ICASSP.2017.7952603
[4]
Borghesi A, 2019, AAAI CONF ARTIF INTE, P9428
[7]
Fereidooni H, 2016, 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS)
[8]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[9]
Malware Detection with Malware Images using Deep Learning Techniques
[J].
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019),
2019,
:95-102
[10]
Hu W., 2018, WORKSH 32 AAAI C ART, P245