共 50 条
- [1] Black-box Adversarial Attacks with Limited Queries and Information [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80
- [2] Inspecting Prediction Confidence for Detecting Black-Box Backdoor Attacks [J]. THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 1, 2024, : 274 - 282
- [3] Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2018, : 453 - 458
- [4] Black-Box Graph Backdoor Defense [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT V, 2024, 14491 : 163 - 180
- [5] Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 297 - 311
- [6] Black-Box Data Poisoning Attacks on Crowdsourcing [J]. PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2023, : 2975 - 2983
- [9] Black-box Attacks Against Neural Binary Function Detection [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 1 - 16
- [10] Black-box Attacks to Log-based Anomaly Detection [J]. 2022 18TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2022): INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022, : 310 - 316