共 50 条
- [1] Secret key-based Authentication with a Privacy Constraint [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1791 - 1795
- [2] Evaluating the Adversarial Robustness of Adaptive Test-time Defenses [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,
- [5] A Secret Key-Based Security Architecture for Wireless Sensor Networks [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION ENGINEERING (ICCIE), 2015, : 79 - 82
- [6] Key-Based Input Transformation Defense Against Adversarial Examples [J]. 2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
- [8] Demystifying the Adversarial Robustness of Random Transformation Defenses [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,
- [9] Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 33, NEURIPS 2020, 2020, 33
- [10] Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-Trained Models [J]. IEEE OPEN JOURNAL OF SIGNAL PROCESSING, 2024, 5 : 902 - 913