Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/corr/abs-1811-02658
%A Wang, Yujia
%A Miller, David J.
%A Kesidis, George
%D 2018
%J CoRR
%K dblp
%T When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.
%U http://dblp.uni-trier.de/db/journals/corr/corr1811.html#abs-1811-02658
%V abs/1811.02658
@article{journals/corr/abs-1811-02658,
added-at = {2018-11-22T00:00:00.000+0100},
author = {Wang, Yujia and Miller, David J. and Kesidis, George},
biburl = {https://www.bibsonomy.org/bibtex/29c00c0236ef823979ab66a58cec165e9/dblp},
ee = {http://arxiv.org/abs/1811.02658},
interhash = {7a52a3d6f9646b0e285775d57128018f},
intrahash = {9c00c0236ef823979ab66a58cec165e9},
journal = {CoRR},
keywords = {dblp},
timestamp = {2018-11-23T11:38:04.000+0100},
title = {When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.},
url = {http://dblp.uni-trier.de/db/journals/corr/corr1811.html#abs-1811-02658},
volume = {abs/1811.02658},
year = 2018
}