Publisher
Springer International Publishing
Reference31 articles.
1. Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems. tensorflow.org (2015). http://tensorflow.org/
2. Baluja, S., Fischer, I.: Learning to attack: adversarial transformation networks. In: Proceedings of AAAI (2018)
3. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);B Biggio,2013
4. Biggio, B., Fumera, G., Roli, F.: Pattern recognition systems under attack: design issues and research challenges. Int. J. Pattern Recogn. Artif. Intell. 28(07) (2014)
5. Chatfield, K., Simonyan, K., Vedaldi, A., Zisserman, A.: Return of the devil in the details: delving deep into convolutional nets. In: Proceedings of the British Machine Vision Conference (BMVC) (2014)
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献