Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. M. (2018). A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View. IEEE access, 6, 12103-12117. https://doi.org/10.1109/ACCESS.2018.2805680
Chicago-Zitierstil (17. Ausg.)Liu, Qiang, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, und Victor C. M. Leung. "A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View." IEEE Access 6 (2018): 12103-12117. https://doi.org/10.1109/ACCESS.2018.2805680.
MLA-Zitierstil (9. Ausg.)Liu, Qiang, et al. "A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View." IEEE Access, vol. 6, 2018, pp. 12103-12117, https://doi.org/10.1109/ACCESS.2018.2805680.
Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.