APA (7th ed.) Citation

Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. M. (2018). A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View. IEEE access, 6, 12103-12117. https://doi.org/10.1109/ACCESS.2018.2805680

Chicago Style (17th ed.) Citation

Liu, Qiang, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, and Victor C. M. Leung. "A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View." IEEE Access 6 (2018): 12103-12117. https://doi.org/10.1109/ACCESS.2018.2805680.

MLA (9th ed.) Citation

Liu, Qiang, et al. "A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View." IEEE Access, vol. 6, 2018, pp. 12103-12117, https://doi.org/10.1109/ACCESS.2018.2805680.

Warning: These citations may not always be 100% accurate.