共 10 条
[1]
[Anonymous], 1963, Avtomat I Telemekh
[2]
[Anonymous], 2014, Support Vector Machines Applications
[3]
Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401
[4]
Fredrikson M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P17
[5]
Universal adversarial perturbations
[J].
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017),
2017,
:86-94
[6]
SoK: Security and Privacy in Machine Learning
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:399-414
[7]
Membership Inference Attacks Against Machine Learning Models
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:3-18
[8]
Tramèr F, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P601
[9]
Automatically Evading Classifiers A Case Study on PDF Malware Classifiers
[J].
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016),
2016,
[10]
STD: Sparse-to-Dense 3D Object Detector for Point Cloud
[J].
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019),
2019,
:1951-1960