1. Misleading authorship attribution of source code using adversarial learning;quiring;Proceedings of the 28th USENIX Security Symposium,0
2. Generating adversarial computer programs using optimized obfuscations;srikant;Proceedings of the 9th International Conference on Learning Representations Virtual Event Austria May 3–7,0
3. Explaining and harnessing adversarial examples;goodfellow;Proceedings of the 3rd International Conference on Learning Representations,0
4. Adversarial training methods for semi-supervised text classification;miyato;Proceedings of the 5th International Conference on Learning Representations,0
5. Generating Adversarial Examples for Holding Robustness of Source Code Processing Models