-
佚名. 中国互联网络信息中心发布第46次《中国互联网络发展状况统计报告》 [J]. 国家图书馆学刊, 2020, 29(06):19
-
李德毅, 刘常昱, 杜鹢, 等. 不确定性人工智能 [J]. 软件学报, 2004, 15(11): 1583-1594.
-
王柯林, 杨珂, 赵瑞哲, 等. 基于随机森林的抗混淆Android恶意应用检测 [J]. 信息安全研究, 2021,7(02): 126-135
-
Szegedy C, Zaremba W, Sutskever I. Intriguing properties of neural networks [C] // 2nd Int Conf on Learning Representations, Banff: ICLR, 2014:1-10
-
Barreno M, Nelson B, Joseph A D, et al. The security of machine learning[J]. Machine Learning, 2010, 81(2): 121-148
-
于颖超, 丁琳, 陈左宁. 机器学习系统面临的安全攻击及其防御技术研究[J]. 信息网络安全, 2018, 213(09): 10-18
-
Meng Dongyu, Chen Hao. Magnet: a two-pronged defense against adversarial examples [C] // Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security, New York: ACM, 2017: 135-147
-
Fredrikson M, Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures [C] // Proc of the 22nd ACM SIGSAC Conf on Computer and Communications Security, New York: ACM, 2015: 1322-1333
-
Xu Weilin, Qi Yanjun, Evans D. Automatically evading classifiers [C] // Proc of the 2016 network and distributed systems symp, California: NDSS, 2016: 21-24
-
Stevens D, Lowd D. On the hardness of evading combinations of linear classifiers [C] // Proc of the 2013 ACM workshop on Artificial intelligence and security, New York: ACM, 2013: 77-86
-
Dong Yinpeng, Liao Fangzhou, Pang Tianyu, et al. Boosting adversarial attacks with momentum [C] // Proce of the IEEE Conf on Computer Vision and Pattern Recognition, New York: IEEE, 2018: 9185-9193
-
纪守领, 杜天宇, 李进锋, 等. 机器学习模型安全与隐私研究综述[J]. 软件学报, 2021, 32(01): 41-67
-
Lowd D, Meek C. Adversarial learning [C] // Proc of the eleventh ACM SIGKDD int conf on Knowledge discovery in data mining, New York: ACM, 2005: 641-647
-
Tramèr F, Zhang F, Juels A, et al. Stealing machine learning models via prediction apis [C] // 2018 IEEE Symp on Security and Privacy, Berkeley: USENIX, 2016: 601-618
-
Papernot N, McDaniel P, Goodfellow I, et al. Practical black-box attacks against machine learning [C] // Proc of the 2017 ACM on Asia conf on computer and communications security, New York: ACM, 2017: 506-519
-
Wang Binghui, Gong Neil Zhenqiang. Stealing hyperparameters in machine learning [C] // IEEE Symp on Security and Privacy, Piscataway, NJ: IEEE, 2018: 36-52
-
Arp D, Spreitzenbarth M, Hubner M, et al. Drebin: Effective and explainable detection of android malware in your pocket [C] // Network & Distributed System Security Symp, California: NDSS, 2014: 23-26
|