Author:
Wang Xianmin,Li Jing,Kuang Xiaohui,Tan Yu-an,Li Jin
Funder
National Natural Science Foundation of China
Natural Science Foundation of Guangdong Province, China
Guangzhou Scholars Project for Universities of Guangzhou, China
Science and Technology Planning Project of Guangdong Province, China
National Natural Science Foundation for Outstanding Youth Foundation, China
National Key R&D Program of China
Shandong Provincial Key R&D Program of China
JSPS
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference109 articles.
1. A. Adler, Vulnerabilities in biometric encryption systems, in: International Conference on Audio- and Video-Based Biometric Person Authentication, 2005, pp. 1100–1109.
2. Defense Against Universal Adversarial Perturbations;Akhtar,2018
3. Attitude estimation based on arrays of passive RFID tags;Alvareznarciandi;IEEE Trans. Antennas and Propagation,2018
4. The security of machine learning;Barreno;Mach. Learn.,2010
5. Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks;Biggio,2011
Cited by
143 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献