共 50 条
- [31] Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 96 - 106
- [33] Opening the Black-Box of Model Transformation MODELLING FOUNDATIONS AND APPLICATIONS, 2015, 9153 : 171 - 186
- [36] Black-box membership inference attacks based on shadow model Journal of China Universities of Posts and Telecommunications, 2024, 31 (04): : 1 - 16
- [38] A Black-Box Approach for Detecting the Failure Traces TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 252 - 259
- [39] A Black-Box Approach to Latency and Throughput Analysis 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 603 - 604
- [40] Verification of GUI Applications: A Black-Box Approach LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: TECHNOLOGIES FOR MASTERING CHANGE, PT I, 2014, 8802 : 236 - 252