共 50 条
- [41] Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms [J]. COMPUTER VISION - ECCV 2018, PT XII, 2018, 11216 : 158 - 174
- [42] KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 247 - 264
- [44] Understanding Black-Box Attacks Against Object Detectors from a User's Perspective [J]. QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2022, 2022, 1621 : 266 - 280
- [45] Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems [J]. 2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 692 - 699
- [46] MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 259 - 274
- [48] Black-box adversarial attacks by manipulating image attributes [J]. INFORMATION SCIENCES, 2021, 550 : 285 - 296
- [49] Black-box Adversarial Attacks on Video Recognition Models [J]. PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA (MM'19), 2019, : 864 - 872
- [50] Black-box Adversarial Attacks in Autonomous Vehicle Technology [J]. 2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,