参考文献/References:
[1] Szegedy C,Zaremba W,Sutskever I,et al.Intriguing properties of neural networks[EB/OL].[2020-06-17].https://arxiv.org/abs/1312.6199.
[2] Kurakin A,Goodfellow I,Bengio S.Adversarial examples in the physical world[EB/OL].[2020-06-17].https://arxiv.org/abs/1607.02533v4.
[3] Papernot N,McDaniel P,Jha S,et al.The limitations of deep learning in adversarial settings[EB/OL].[2020-06-17].https://arxiv.org/abs/1511.07528.
[4] Goodfellow I J,Shlens J,Szegedy C.Explaining and harnessing adversarial examples[EB/OL].[2020-06-17].https://arxiv.org/pdf/1412.6572.pdf.
[5] 张钹,朱军,苏航.迈向第三代人工智能[J].中国科学:信息科学,2020,50(9):1281-1302.
[6] 蒲元芳,张巍,滕少华,等.基于决策树的协同网络入侵检测[J].江西师范大学学报:自然科学版,2010,34(3):302-307.
[7] 易倩,滕少华,张巍.基于马氏距离的K均值聚类算法的入侵检测[J].江西师范大学学报:自然科学版,2012,36(3):284-287.
[8] Meng Dongyu,Chen Hao.Magnet:a two-pronged defense against adversarial examples[EB/OL].[2020-06-17].https://arxiv.org/abs/1705.09064v2.
[9] Metzen J,Jan H,Genewein T,et al.On detecting adversarial perturbations[EB/OL].[2020-06-17].https://arxiv.org/abs/1702.04267.
[10] Hendrycks D,Gimpel K.Early methods for detecting adversarial images[EB/OL].[2020-06-17].https://arxiv.org/pdf/1608.00530v2.pdf.
[11] Li Xin,Li Fuxin.Adversarial examples detection in deep networks with convolutional filter statistics[EB/OL].[2020-06-17].https://arxiv.org/abs/1612.07767.
[12] Xu Weilin,Evans D,Qi Yanjun.Feature squeezing:detecting adversarial examples in deep neural networks[EB/OL].[2020-06-17].https://arxiv.org/pdf/1704.01155.pdf.
[13] Liang Bin,Li Hongcheng,Su Miaoqiang,et al.Detecting adversarial image examples in deep networks with adaptive noise reduction[EB/OL].[2020-06-17].https://arxiv.org/pdf/1705.08378.pdf.
[14] Krizhevsky A,Sutskever I,Hinton G.Image net classification with deep convolutional neural networks[J].Communications of the ACM,2017,60(6):84-90.
[15] Lecun Y,Bottou L,Bengio Y,et al.Gradient-based learning applied to document recognition[J].Proceedings of the IEEE,1998,86(11):2278-2324.
[16] Ashmeet Lamba.CNN for Fashion MNIST Dataset[EB/OL].[2020-06-17].https://github.com/ashmeet13/FashionMNIST-CNN.
[17] He K,Zhang X,Ren S,et al.Deep residual learning for image recognition[EB/OL].[2020-06-17].https://ieeexplore.ieee.org/document/7780459.
[18] Rony J,Hafemann L G,Oliveira L S,et al.Decoupling direction and norm for efficient gradient-based l2 adversarial attacks and defenses[EB/OL].[2020-06-17].https://arxiv.org/pdf/1811.09600.pdf.
[19] Madry A,Makelov A,Schmidt L,et al.Towards deep learning models resistant to adversarial attacks[EB/OL].[2020-06-17].https://arxiv.org/pdf/1706.06083.pdf.
[20] Chen Pinyu,Sharma Y,Zhang Huan,et al.Ead:elastic-net attacks to deep neural networks via adversarial examples[EB/OL].[2020-06-17].https://arxiv.org/pdf/1709.04114.pdf.
[21] Powers D M.Evaluation:from precision,recall and F-measure to ROC,informedness,markedness and correlation[EB/OL].[2020-06-17].https://arxiv.org/abs/2010.16061v1.