共 50 条
- [2] Classifying RFID attacks and defenses [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 491 - 505
- [3] Tampering in RFID: A Survey on Risks and Defenses [J]. Mobile Networks and Applications, 2010, 15 : 502 - 516
- [4] Tampering in RFID: A Survey on Risks and Defenses [J]. MOBILE NETWORKS & APPLICATIONS, 2010, 15 (04): : 502 - 516
- [6] Survey of Attacks and Defenses against SGX [J]. PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1492 - 1496
- [8] Privacy Attacks and Defenses in Machine Learning: A Survey [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422
- [9] Survey on adversarial attacks and defenses for object detection [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (11): : 260 - 277
- [10] Survey on Privacy Attacks and Defenses in Machine Learning [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (03): : 866 - 892