1 |
丹尼尔·阿瑞亚, 梅格·金, 李欣来. 人工智能对军事防御与安全的影响(译文)[J]. 信息安全与通信保密, 2022(6): 67-73.
|
|
ARAYA D, KING M, LI Xinlai. The Impact of Artificial Intelligence on Military Defence and Security[J]. Information Security and Communications Privacy, 2022(6): 67-73.
|
2 |
中国信息通信研究院. 人工智能白皮书(2022年)[EB/OL]. [2023-03-28]. .
|
|
China Academy of Information and Communications Technology. Artificial Intelligence White Paper (2022)[EB/OL]. [2023-03-28]. .
|
3 |
李睿深, 石晓军, 郝英好. 人工智能[M]. 北京: 国防工业出版社, 2022: 32-37.
|
|
LI Ruishen, SHI Xiaojun, HAO Yinghao. Artificial Intelligence[M]. Beijing: National Defense Industry Press, 2022: 32-37.
|
4 |
刘伟. 人机融合: 超越人工智能[M]. 北京: 清华大学出版社, 2021: 10-14.
|
|
LIU Wei. Human-Machine Fusion: Beyond Artificial Intelligence[M]. Beijing: Tsinghua University Press, 2021: 10-14.
|
5 |
王伟, 王钦钊, 刘钢锋, 等. 地面无人系统反制关键技术分析与综述[J]. 航空学报, 2022, 43(7): 16-40.
|
|
WANG Wei, WANG Qinzhao, LIU Gangfeng, et al. Countering Unmanned Ground System: A Review of Key Technologies[J]. Acta Aeronautica et Astronautica Sinica, 2022, 43(7): 16-40.
|
6 |
刘文学, 王涛, 李赵健伟, 等. 反无人机装备发展现状及趋势[C]∥2022年无人系统高峰论坛(USS2022)论文集. 中国,西安: 中国工程院, 西北工业大学, 中国航天科工集团有限公司, 国防科技大学, 2022: 37-44.
|
|
LIU Wenxue, WANG Tao, LI Zhao jianwei, et al. Development Status and Trend of Anti-UAV Equipment[C]∥2022 Unmanned Systems Summit Forum. Xi'an, China: Chinese Academy of Engineering, Northwestern Polytechnical University, China Aerospace Science and Industry Corporation Limited, National University of Defense Technology, 2022: 37-44.
|
7 |
张冬冬, 王春平, 付强. 国外无人机蜂群发展状况及反蜂群策略研究[J]. 飞航导弹, 2021(6): 56-62.
|
|
ZHANG Dongdong, WANG Chunping, FU Qiang. Research on the Development of UAV Swarm and Anti-bee Swarm Strategy Abroad[J]. Aerodynamic Missile Journal, 2021(6): 56-62.
|
8 |
迟蛟龙, 李洪权, 李新, 等. 近海反UUV战法研究[C]∥2022年无人系统高峰论坛(USS2022)论文集. 中国,西安: 中国工程院, 西北工业大学, 中国航天科工集团有限公司, 国防科技大学, 2022: 69-73.
|
|
CHI Jiaolong, LI Hongquan, LI Xin, et al. Analysis of Counter-UUV Warfare in Offshore Waters[C]∥2022 Unmanned Systems Summit Forum. Xi'an, China: Chinese Academy of Engineering, Northwestern Polytechnical University, China Aerospace Science and Industry Corporation Limited, National University of Defense Technology, 2022: 69-73.
|
9 |
韦正现, 王桐. 反智能化作战的研究启示与对策思考[EB/OL]. (2020-04-27)[2023-03-28]. .
|
|
WEI Zhengxian, WANG Tong. Research Enlightenment and Countermeasure Thinking of Anti-Intelli- Gent Operation[EB/OL]. (2020-04-27)[2023-03-28]. .
|
10 |
STARCK N, BIERBRAUER D, MAXWELL P. Artificial Intelligence, Real Risks: Understanding—and Mitigating—Vulnerabilities in the Military Use of AI[EB/OL]. (2022-01-18)[2023-03-28]. .
|
11 |
TRAMÈR F, ZHANG Fan, JUELS A, et al. Stealing Machine Learning Models Via Prediction APIs[C]∥Proceedings of the 25th USENIX Conference on Security Symposium. USA: USENIX Association, 2016: 601-618.
|
12 |
GOODFELLOW I J, SHLENS J, SZEGEDY C. Explaining and Harnessing Adversarial Examples[EB/OL]. (2015-03-20)[2023-03-28]. .
|
13 |
KOMKOV S, PETIUSHKO A. AdvHat: Real-World Adversarial Attack on ArcFace Face ID System[C]∥2020 25th International Conference on Pattern Recognition (ICPR). Piscataway, NJ, USA: IEEE, 2021: 819-826.
|
14 |
易平, 王科迪, 黄程, 等. 人工智能对抗攻击研究综述[J]. 上海交通大学学报, 2018, 52(10): 1298-1306.
|
|
YI Ping, WANG Kedi, HUANG Cheng, et al. Adversarial Attacks in Artificial Intelligence: A Survey[J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1298-1306.
|
15 |
LAISHRAM R, PHOHA V V. Curie: A Method for Protecting SVM Classifier from Poisoning Attack[EB/OL]. (2016-07-07)[2023-03-28]. .
|
16 |
GU Shixiang, RIGAZIO L. Towards Deep Neural Network Architectures Robust to Adversarial Examples[EB/OL]. (2015-04-09)[2023-03-28]. .
|
17 |
LIU Kang, DOLAN-GAVITT B, GARG S. Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks[C]∥Research in Attacks, Intrusions, and Defenses. Cham: Springer International Publishing, 2018: 273-294.
|
18 |
ABADI M, CHU A, GOODFELLOW I, et al. Deep Learning with Differential Privacy[C]∥Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: Association for Computing Machinery, 2016: 308-318.
|
19 |
COMITER M. Attacking Artificial Intelligence: AI's Security Vulnerability and What Policymakers CanDo About It[R].Belfer Center for Science and International Affairs, Cambridge, MA, USA: 2019:55-70.
|
20 |
高强, 游宏梁, 汤珊红, 等. 军事数据治理概念与框架研究[J]. 情报理论与实践, 2019, 42(12): 55-59.
|
|
GAO Qiang, YOU Hongliang, TANG Shanhong, et al. Research on Military Data Governance Concept and Framework[J]. Information Studies: Theory & Application, 2019, 42(12): 55-59.
|
21 |
胡晓峰. 战争科学论: 认识和理解战争的科学基础与思维方法[M]. 北京: 科学出版社, 2018: 54-60.
|
|
HU Xiaofeng. War Science Theory: the Scientific Basis and Thinking Method of Understanding War[M]. Beijing: Science Press, 2018: 54-60.
|