共 50 条
- [31] Automated formal verification for flexible manufacturing systems Journal of Intelligent Manufacturing, 2014, 25 : 1181 - 1195
- [32] Automated Crowdturfing Attacks and Defenses in Online Review Systems CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1143 - 1158
- [33] VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 255 - 284
- [35] PCA-Based Adversarial Attacks on Signature Verification Systems DOCUMENT ANALYSIS AND RECOGNITION-ICDAR 2024, PT II, 2024, 14805 : 364 - 379
- [36] Countermeasure to Handle Replay Attacks in Practical Speaker Verification Systems 2016 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM), 2016,
- [37] VeriFace: Defending against Adversarial Attacks in Face Verification Systems CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3151 - 3166
- [38] Quasi-Newton Adversarial Attacks on Speaker Verification Systems 2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 527 - 531
- [40] On the Importance of Delexicalization for Fact Verification 2019 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING AND THE 9TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING (EMNLP-IJCNLP 2019): PROCEEDINGS OF THE CONFERENCE, 2019, : 3413 - 3418