37
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references61

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Towards Evaluating the Robustness of Neural Networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              The Limitations of Deep Learning in Adversarial Settings

                Bookmark

                Author and article information

                Journal
                IEEE Access
                IEEE Access
                Institute of Electrical and Electronics Engineers (IEEE)
                2169-3536
                2018
                2018
                : 6
                : 12103-12117
                Article
                10.1109/ACCESS.2018.2805680
                413e2409-6aaa-40b5-b445-b4c653c64098
                © 2018
                History

                Comments

                Comment on this article