Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Amin M, Salleh M, Ibrahim S, Katmin M, Shamsuddin M (2003) Information hiding using steganography. In: 4th National conference of telecommunication technology proceedings, pp 21–25. https://doi.org/10.1109/NCTT.2003.1188294
2. Athalye A, Engstrom L, Ilyas A, Kwok K (2018) Synthesizing robust adversarial examples. In: Proceedings of the 35th international conference on machine learning, vol 80, pp 284–293
3. Brown TB, Mané D, Roy A, Abadi M, Gilmer J (2017) Adversarial patch. In: Neural information processing systems workshops
4. Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on security and privacy, pp 39–57. https://doi.org/10.1109/SP.2017.49
5. Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: International conference on learning representations
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献