共 66 条
- [1] A unified gradient regularization family for adversarial examples. Lyu C,Huang KZ,Liang HN. IEEE Int Conf on Data Mining . 2015
- [2] The limitations of deep learning in adversarial settings. PAPERNOT N,MCDANIEL P,JHA S,et al. IEEE European Symposium on Security and Privacy . 2016
- [3] Adversarial manipulation of deep representations. Sabour S,Cao YS,Faghri F,et al. https://arxiv.org/abs/ 1511.05122 . 2015
- [4] Threat of adversarial attacks on deep learning in computer vision:a survey. AKHTAR N,MIAN A. IEEE Access . 2018
- [5] Biologically inspired protection of deep networks from adversarial attacks. Nayebi A,Ganguli S. https://arxiv.org/abs/ 1703.09202 . 2017
- [6] Identification and evaluation of discriminative lexical features of malware URL for real-time classification. Olalere M,Abdullah MT,Mahmod R,et al. Int Conf on Computer and Communication Engineering . 2016
- [7] Adversarial examples for semantic segmentation and object detection. Xie CH,Wang JY,Zhang ZS,et al. IEEE Int Conf on Computer Vision . 2017
- [8] "Deep learning:The frontier for dis-tributed attack detection in fog-to-things computing,". A.Abeshu,N.Chilamkurti. IEEE Communications Magazine . 2018
- [10] Generative adversarial networks. Goodfellow IJ,Pouget-Abadie J,Mirza M,et al. https://arxiv.org/abs/ 1406.2661 . 2014