共 50 条
- [31] Audio steganography using bit modification 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, 2003, : 629 - 632
- [32] Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1235 - 1242
- [33] AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Models APPLIED SCIENCES-BASEL, 2022, 12 (04):
- [34] Invisible Encoded Backdoor attack on DNNs using Conditional GAN 2023 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, ICCE, 2023,
- [36] Survey of Backdoor Attack and Defense Algorithms Based on Federated Learning Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2607 - 2626
- [37] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2021, 24 (03): : 782 - 794
- [39] Replay Attack Detection using DNN for Channel Discrimination 18TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2017), VOLS 1-6: SITUATED INTERACTION, 2017, : 97 - 101
- [40] Backdoor Attack Against One-Class Sequential Anomaly Detection Models ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PT III, PAKDD 2024, 2024, 14647 : 262 - 274