一种针对多核神经网络处理器的窃取攻击 https://dl.ccf.org.cn/file_server/20200904/159_226_43_5/xxaqxb3/d1f8069ab3454968aa5079f2463b933f.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5085089766885376
基于可逆信息隐藏技术的认证方案的攻击与改进 https://www.ccf.org.cn/upload/resources/image/2022/03/25/187123.png 2022-03-25
http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20220104&flag=1
智能家居攻击与防御方法综述 https://dl.ccf.org.cn/file_server/20210830/159_226_43_10/xiaoxiaowei2104/9bc1a861ba23403d9ca1146362f2af5c.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5594631359465472
基于指令集随机化的抗代码注入攻击方法 https://dl.ccf.org.cn/file_server/20200904/159_226_43_5/xxaqxb4/01ddeb027d5f4034b3ccddf67da67097.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5085153367132160
面向低维工控网数据集的对抗样本攻击分析 https://www.ccf.org.cn/upload/resources/image/2022/03/25/187122.png 2022-03-25
https://crad.ict.ac.cn/CN/10.7544/issn1000-1239.2020.20190844
针对深度学习模型的对抗性攻击与防御 https://dl.ccf.org.cn/file_server/20210527/159_226_43_5/yjyfz21-5/8330369f951d41779f2171a4cbf15a1a.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5460117535901696
基于深度学习的位置隐私攻击 https://dl.ccf.org.cn/file_server/20220215/159_226_43_8/jsjyajfa2/39b3edd3af614aa7865f2ccde1bd9ec6.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5834059318986752
一种无监督的窃密攻击及时发现方法 https://dl.ccf.org.cn/file_server/20210527/159_226_43_5/yjyfz21-5/6d3505bbae7b48d39feeb48c2145c620.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5460117534328832