当前位置: X-MOL 学术IEEE Trans. Inform. Forensics Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code
IEEE Transactions on Information Forensics and Security ( IF 6.8 ) Pub Date : 2024-05-16 , DOI: 10.1109/tifs.2024.3402153
Yulong Yang 1 , Haoran Fan 1 , Chenhao Lin 1 , Qian Li 1 , Zhengyu Zhao 1 , Chao Shen 1
Affiliation  



中文翻译:


利用源代码迁移学习的对抗性示例漏洞


更新日期:2024-05-16
down
wechat
bug