Author:
Wang Feilong,Wang Xin,Hong Yuan,Tyrrell Rockafellar R.,Ban Xuegang (Jeff)
Funder
National Science Foundation
Reference56 articles.
1. Threat of Adversarial attacks on deep Learning in computer vision: a survey;Akhtar;IEEE Access,2018
2. Almalki, S.A., Song, J., 2020. A Review on Data Falsification-Based attacks In Cooperative Intelligent Transportation Systems 17.
3. Real time queue length estimation for signalized intersections using travel times from mobile sensors;Ban;Transportation Research Part C: Emerging Technologies,2011
4. Ban, X. (Jeff), Herring, R., Bayen, A.M., Hao, P., 2009. Delay pattern estimation for signalized intersections using sampled travel times. Transportation Research Record, in: Transportation Research Board of the National Academies.
5. Biggio, B., Nelson, B., Laskov, P., 2013. Poisoning Attacks against Support Vector Machines. arXiv:1206.6389 [cs, stat].
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献