1 |
李欣姣,吴国伟,姚琳,等. 机器学习安全攻击与防御机制研究进展和未来挑战[J]. 软件学报, 2021, 32(2):406-423. 10.13328/j.cnki.jos.006147
|
|
LI X J, WU G W, YAO L, et al. Progress and future challenges of security attacks and defense mechanisms in machine learning[J]. Journal of Software, 2021, 32(2): 406-423. 10.13328/j.cnki.jos.006147
|
2 |
纪守领,杜天宇,李进锋,等. 机器学习模型安全与隐私研究综述[J].软件学报, 2021, 32(1):41-67. 10.13328/j.cnki.jos.006131
|
|
JI S L, DU T Y, LI J F, et al. Security and privacy of machine learning models: a survey[J]. Journal of Software, 2021, 32(1): 41-67. 10.13328/j.cnki.jos.006131
|
3 |
陈宇飞,沈超,王骞,等. 人工智能系统安全与隐私风险[J]. 计算机研究与发展, 2019, 56(10):2135-2150. 10.7544/issn1000-1239.2019.20190415
|
|
CHEN Y F, SHEN C, WANG Q, et al. Security and privacy risks in artificial intelligence systems[J]. Journal of Computer Research and Development, 2019, 56(10):2135-2150. 10.7544/issn1000-1239.2019.20190415
|
4 |
PARKHI O M, VEDALDI A, ZISSERMAN A, et al. Deep face recognition[C]// Proceedings of the 2015 British Machine Vision Conference. Durham: BMVA Press, 2015: No.41. 10.5244/c.29.41
|
5 |
XUE M F, HE C, WANG J, et al. Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems[J]. Peer-to-Peer Networking and Applications, 2021, 14(3): 1458-1474. 10.1007/s12083-020-01031-z
|
6 |
CHEN X Y, LIU C, LI B, et al. Targeted backdoor attacks on deep learning systems using data poisoning[EB/OL]. (2017-12-15) [2021-09-22]..
|
7 |
相迎宵. I-SIG系统中双向投毒攻击分析及防护[D]. 北京:北京交通大学, 2019.
|
|
XIANG Y X. Analysis and defense of bidirectional poisoning attack in I-SIG system[D]. Beijing: Beijing Jiaotong University, 2019.
|
8 |
YAO Y S, LI H Y, ZHENG H T, et al. Latent backdoor attacks on deep neural networks[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2019: 2041-2055. 10.1145/3319535.3354209
|
9 |
CHEN C Y, SEFF A, KORNHAUSER A, et al. DeepDriving: learning affordance for direct perception in autonomous driving[C]// Proceedings of the 2015 IEEE International Conference on Computer Vision. Piscataway: IEEE, 2015: 2722-2730. 10.1109/iccv.2015.312
|
10 |
GU T Y, DOLAN-GAVITT B, GARG S. BadNets: identifying vulnerabilities in the machine learning model supply chain[EB/OL]. (2019-03-11) [2021-09-22].. 10.1109/access.2019.2909068
|
11 |
TANG R X, DU M N, LIU N H, et al. An embarrassingly simple approach for trojan attack in deep neural networks[C]// Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2020: 218-228. 10.1145/3394486.3403064
|
12 |
LIU Y F, MA X J, BAILEY J, et al. Reflection backdoor: a natural backdoor attack on deep neural networks[C]// Proceedings of the 2020 European Conference on Computer Vision, LNCS 12355. Cham: Springer, 2020: 182-199.
|
13 |
SAHA A, SUBRAMANYA A, PIRSIAVASH H. Hidden trigger backdoor attacks[C]// Proceedings of the 34th AAAI Conference on Artificial Intelligence. Palo Alto, CA: AAAI Press, 2020: 11957-11965. 10.1609/aaai.v34i07.6871
|
14 |
SAHA A, TEJANKAR A, KOOHPAYEGANI S A, et al. Backdoor attacks on self-supervised learning[C]// Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2022: 13327-13336. 10.1109/cvpr52688.2022.01298
|
15 |
TURNER A, TSIPRAS D, MADRY A. Clean-label backdoor attacks[EB/OL]. (2018-12-21) [2021-09-22]..
|
16 |
高程程,惠晓威. 基于灰度共生矩阵的纹理特征提取[J]. 计算机系统应用, 2010, 19(6):195-198. 10.3969/j.issn.1003-3254.2010.06.047
|
|
GAO C C, HUI X W. GLCM-based texture feature extraction[J]. Journal of Computer Systems and Applications, 2010, 19(6):195-198. 10.3969/j.issn.1003-3254.2010.06.047
|
17 |
万梦翔,姚寒冰. 面向恶意网页训练数据生成的GAN模型[J]. 计算机工程与应用, 2021, 57(6):124-130.
|
|
WAN M X, YAO H B. GAN model for malicious web training data generation[J]. Computer Engineering and Applications, 2021, 57(6): 124-130.
|
18 |
LeCUN Y, BOTTOU L, BENGIO Y, et al. Gradient-based learning applied to document recognition[J]. Proceedings of the IEEE, 1998, 86(11): 2278-2324. 10.1109/5.726791
|
19 |
LIU Y T, XIE Y, SRIVASTAVA A. Neural trojans[C]// Proceedings of the IEEE 35th International Conference on Computer Design. Piscataway: IEEE, 2017: 45-48. 10.1109/iccd.2017.16
|
20 |
SHEN S Q, TOPLE S, SAXENA P. AUROR: defending against poisoning attacks in collaborative deep learning systems[C]// Proceedings of the 32nd Annual Conference on Computer Security Applications. New York: ACM, 2016: 508-519. 10.1145/2991079.2991125
|
21 |
ANWAR S, HWANG K, SUNG W. Structured pruning of deep convolutional neural networks[J]. ACM Journal on Emerging Technologies in Computing Systems, 2017, 13(3): No.32. 10.1145/3005348
|