共 66 条
- [31] A survey of deep learning:platforms,applications and emerging research trends. Hatcher WG,Yu W. IEEEAccess . 2018
- [32] Adversarial example defenses:ensembles of weak defenses are not strong. He W,Wei J,Chen XY,et al. https://arxiv.org/abs/ 1706.04701 . 2017
- [33] Afew-shot deep learning approach for improved intrusion detection. Chowdhury MMU,Hammond F,Konowicz G,et al. Proc 8th Annual Ubiquitous Computing,Electronics and Mobile Communication Conf . 2017
- [34] Foveation-based mechanisms alleviate adversarial examples. Luo Y,Boix X,Roig G,et al. https://arxiv.org/abs/ 1511.06292 . 2015
- [35] Intriguing properties of adversarial examples. Cubuk ED,Zoph B,Schoenholz SS,et al. https://arxiv.org/abs/ 1711.02846 . 2017
- [36] Service popularity-based smart resources partitioning for fog computing-enabled industrial Internet of Things. Li GL,Wu J,Li JH,et al. IEEE Trans Ind Inform . 2018
- [37] Deep learning for smart industry:efficient manufacture inspection system with fog computing. Li LZ,Ota K,Dong MX. IEEE Trans Ind Inform . 2018
- [38] Deep NFV:a light-weight framework for intelligent edge network functions virtualization. Li LZ,Ota K,Dong MX. IEEE Network . 2018
- [39] PhD forum:deep learning-based real-time malware detection with multi-stage analysis. Yuan XY. IEEE Int Conf on Smart Computing . 2017
- [40] Practical secure aggregation for privacy-preserving machine learning. Bonawitz K,Ivanov V,Kreuter B,et al. Proc ACM SIGSAC Conf on Computer and Communications Security . 2017