Author:
Ftaimi Asmaa,Mazri Tomader
Reference58 articles.
1. Chang, C.-Y., Nikaein, N.: Cloudification and slicing in 5G radio access network, http://www.theses.fr/2018SORUS293/document (2018)
2. Barakabitze, A.A., Ahmad, A., Mijumbi, R., Hines, A.: 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Comput. Netw. 167, 106984 (2020). https://doi.org/10.1016/j.comnet.2019.106984
3. Santos, G.L., Endo, P.T., Sadok, D., Kelner, J.: When 5G meets deep learning: A systematic review. Algorithms. 13, 208 (2020). https://doi.org/10.3390/a13090208
4. Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS ’06. p. 16. ACM Press, Taipei, Taiwan (2006). https://doi.org/10.1145/1128817.1128824.
5. Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical Black-Box Attacks against Machine Learning. arXiv:1602.02697 [cs] (2017)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献