共 50 条
- [31] Practical Black-Box Attacks against Machine Learning PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 506 - 519
- [32] Impossibility of Black-Box Simulation Against Leakage Attacks ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 130 - 149
- [33] Boundary Defense Against Black-box Adversarial Attacks 2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2022, : 2349 - 2356
- [34] Black-Box Attacks against Signed Graph Analysis via Balance Poisoning 2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 530 - 535
- [35] An Efficient Black-Box Vulnerability Scanning Method for Web Application COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017, 2018, 252 : 444 - 455
- [37] Toward an Effective Black-Box Adversarial Attack on Functional Java']JavaScript Malware against Commercial Anti-Virus PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, : 4165 - 4172
- [38] Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 490 - 510
- [39] Black-Box Circular-Secure Encryption beyond Affine Functions THEORY OF CRYPTOGRAPHY, 2011, 6597 : 201 - +
- [40] On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes PUBLIC-KEY CRYPTOGRAPHY, PT II, PKC 2024, 2024, 14602 : 426 - 457