CSpace

浏览/检索结果: 共4条,第1-4条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
Image Denoising Based on GAN with Optimization Algorithm 期刊论文
ELECTRONICS, 2022, 卷号: 11, 期号: 15, 页码: 12
作者:  Zhu, Min-Ling;  Zhao, Liang-Liang;  Xiao, Li
收藏  |  浏览/下载:21/0  |  提交时间:2022/12/07
image denoising  GAN  optimization algorithm  autoencoder  ResNet  
Attention-guided transformation-invariant attack for black-box adversarial examples 期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:  Zhu, Jiaqi;  Dai, Feng;  Yu, Lingyun;  Xie, Hongtao;  Wang, Lidong;  Wu, Bo;  Zhang, Yongdong
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
adversarial examples  attention  media convergence  security  transformation-invariant  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack