Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. M. (2018). A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View. IEEE access, 6, 12103-12117. https://doi.org/10.1109/ACCESS.2018.2805680
Chicago Style (17th ed.) CitationLiu, Qiang, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, and Victor C. M. Leung. "A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View." IEEE Access 6 (2018): 12103-12117. https://doi.org/10.1109/ACCESS.2018.2805680.
MLA (9th ed.) CitationLiu, Qiang, et al. "A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View." IEEE Access, vol. 6, 2018, pp. 12103-12117, https://doi.org/10.1109/ACCESS.2018.2805680.
Warning: These citations may not always be 100% accurate.