共 50 条
- [2] Timing Attack on Random Forests for Generating Adversarial Examples ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2020), 2020, 12231 : 285 - 302
- [3] Fast Local Attack: Generating Local Adversarial Examples for Object Detectors 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
- [4] Attackability Characterization of Adversarial Evasion Attack on Discrete Data KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 1415 - 1425
- [5] Adversarial Examples for Graph Data: Deep Insights into Attack and Defense PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4816 - 4823
- [6] A New Black Box Attack Generating Adversarial Examples Based on Reinforcement Learning 2020 INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE (ICTC), 2020, : 141 - 146
- [7] A method for filtering the attack pairs of adversarial examples based on attack distance Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 339 - 347
- [9] Where and How to Attack? A Causality-Inspired Recipe for Generating Counterfactual Adversarial Examples THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 10, 2024, : 11132 - 11140
- [10] Discrete Adversarial Attack to Models of Code PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (PLDI): : 172 - 195