4.7 Article

A discrete cosine transform-based query efficient attack on black-box object detectors

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Cross-lingual multi-keyword rank search with semantic extension over encrypted data

Zhitao Guan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

A sensitive network jitter measurement for covert timing channels over interactive traffic

Quanxin Zhang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

Space Efficient Quantization for Deep Convolutional Neural Networks

Dong-Di Zhao et al.

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2019)

Article Computer Science, Information Systems

Detecting adversarial examples via prediction difference for deep neural networks

Feng Guo et al.

INFORMATION SCIENCES (2019)

Article Chemistry, Multidisciplinary

Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation

Xianfeng Gao et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Theory & Methods

The security of machine learning in an adversarial setting: A survey

Xianmin Wang et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Artificial Intelligence

One Pixel Attack for Fooling Deep Neural Networks

Jiawei Su et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2019)

Article Computer Science, Hardware & Architecture

Publicly verifiable privacy-preserving aggregation and its application in IoT

Tong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

Communication-efficient outsourced privacy-preserving classification service using trusted processor

Tong Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid

Zhitao Guan et al.

SCIENCE CHINA-INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability

Alzubair Hassan et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers

Wei Wang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Proceedings Paper Computer Science, Information Systems

Towards Evaluating the Robustness of Neural Networks

Nicholas Carlini et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)