×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [77]
作者
Fang, Binx... [5]
Tan, Liang [5]
Ye, Jing [5]
Hu, Xing [4]
Yu, Keping [4]
Cheng, Xue... [3]
更多...
文献类型
期刊论文 [83]
发表日期
2024 [4]
2023 [12]
2022 [13]
2021 [10]
2020 [9]
2019 [10]
更多...
语种
英语 [83]
出处
IEEE TRANS... [9]
COMPUTER C... [4]
IEEE TRANS... [4]
COMPUTERS ... [3]
IEEE TRANS... [3]
INFORMATIO... [3]
更多...
资助项目
National N... [4]
National N... [4]
Sichuan Pr... [4]
China Scho... [3]
Fundamenta... [3]
Japan Soci... [3]
更多...
收录类别
SCI [83]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共83条,第1-10条
帮助
限定条件
收录类别:SCI
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
A prompt-based approach to adversarial example generation and robustness enhancement
期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2024, 卷号: 18, 期号: 4, 页码: 12
作者:
Yang, Yuting
;
Huang, Pei
;
Cao, Juan
;
Li, Jintao
;
Lin, Yun
;
Ma, Feifei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/05/20
robustness
adversarial example
prompt learning
pre-trained language model
Graph Adversarial Immunization for Certifiable Robustness
期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
;
Cheng, Xueqi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/05/20
Adversarial attack
adversarial immunization
certifiable robustness
graph neural networks
node classification
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products
期刊论文
COMPUTER COMMUNICATIONS, 2024, 卷号: 218, 页码: 59-71
作者:
Chen, Jin
;
Guo, Ziyang
;
Tan, Liang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/05/20
Intelligent manufacturing
Operation and maintenance network
Network slicing
Blockchain
Resource transaction
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
;
Wang, Ying
;
Zhao, Yongwei
;
Du, Zidong
;
Guo, Qi
;
Wang, Yanzhi
;
Zhang, Xishan
;
Chen, Tianshi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time
Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 15494-15511
作者:
Yang, Zhiyong
;
Xu, Qianqian
;
Hou, Wenzheng
;
Bao, Shilong
;
He, Yuan
;
Cao, Xiaochun
;
Huang, Qingming
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2024/05/20
Optimization
Training
Perturbation methods
Machine learning
Receivers
Machine learning algorithms
Linear programming
AUC Optimization
adversarial learning
machine learning
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:
Tang, Bowen
;
Wu, Chenggang
;
Yew, Pen-Chung
;
Zhang, Yinqian
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Wang, Wei
;
Wei, Qiang
;
Wang, Zhe
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2024/05/20
Resource contention
scheduling strategy
simultaneous multithreading (SMT)
transient execution attack (TEA)
Improving Face Anti-spoofing via Advanced Multi-perspective Feature Learning
期刊论文
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2023, 卷号: 19, 期号: 6, 页码: 18
作者:
Wang, Zhuming
;
Xu, Yaowen
;
Wu, Lifang
;
Han, Hu
;
Ma, Yukun
;
Li, Zun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Face anti-spoofing
multi-perspective
universal cues
Adversarial camouflage for node injection attack on graphs
期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
;
Sun, Fei
;
Cheng, Xueqi
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/12/04
Adversarial camouflage
Node injection attack
Adversarial attack
Graph neural networks
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models
期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:
Wu, Chen
;
Zhang, Ruqing
;
Guo, Jiafeng
;
De Rijke, Maarten
;
Fan, Yixing
;
Cheng, Xueqi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Adversarial attack
decision-based black-box attack setting
neural ranking models
A New Reconfigurable True Random Number Generator and Physical Unclonable Function Unified Chip With On-Chip Auto-Calibration
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 页码: 14
作者:
Cao, Yuan
;
Liu, Wanyi
;
Zheng, Yue
;
Chen, Shuai
;
Ye, Jing
;
Qian, Lei
;
Chang, Chip-Hong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/12/04
Entropy
Authentication
System-on-chip
Protocols
Jitter
Computer architecture
Rail to rail outputs
True random number generator
physical unclonable function
current-starved ring oscillator