CSpace

浏览/检索结果: 共15条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Adversarial camouflage for node injection attack on graphs 期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Sun, Fei;  Cheng, Xueqi
收藏  |  浏览/下载:8/0  |  提交时间:2023/12/04
Adversarial camouflage  Node injection attack  Adversarial attack  Graph neural networks  
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:  Wu, Chen;  Zhang, Ruqing;  Guo, Jiafeng;  De Rijke, Maarten;  Fan, Yixing;  Cheng, Xueqi
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Adversarial attack  decision-based black-box attack setting  neural ranking models  
Characterizing and Understanding Defense Methods for GNNs on GPUs 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:  Wu, Meng;  Yan, Mingyu;  Yang, Xiaocheng;  Li, Wenming;  Zhang, Zhimin;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Kernel  Purification  Estimation  Graphics processing units  Perturbation methods  Electric breakdown  Training  Graph neural networks  defense  execution semantic  execution pattern  overhead  
Rethinking Label Flipping Attack: From Sample Masking to Sample Thresholding 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 6, 页码: 7668-7685
作者:  Xu, Qianqian;  Yang, Zhiyong;  Zhao, Yunrui;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Data models  Training data  Training  Deep learning  Predictive models  Testing  Optimization  Label flipping attack  machine learning  
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:  Lv, Hao;  Li, Bing;  Zhang, Lei;  Liu, Cheng;  Wang, Ying
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Security  Hardware  Neuromorphic engineering  Computational modeling  Circuit faults  Resistance  Immune system  Adversarial attack  fault injection attack  neuromorphic computing system (NCS)  processing in memory  reliability  resistive memory  
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
Image Denoising Based on GAN with Optimization Algorithm 期刊论文
ELECTRONICS, 2022, 卷号: 11, 期号: 15, 页码: 12
作者:  Zhu, Min-Ling;  Zhao, Liang-Liang;  Xiao, Li
收藏  |  浏览/下载:21/0  |  提交时间:2022/12/07
image denoising  GAN  optimization algorithm  autoencoder  ResNet  
Attention-guided transformation-invariant attack for black-box adversarial examples 期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:  Zhu, Jiaqi;  Dai, Feng;  Yu, Lingyun;  Xie, Hongtao;  Wang, Lidong;  Wu, Bo;  Zhang, Yongdong
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
adversarial examples  attention  media convergence  security  transformation-invariant  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
Semi-supervised anomaly detection in dynamic communication networks 期刊论文
INFORMATION SCIENCES, 2021, 卷号: 571, 页码: 527-542
作者:  Meng, Xuying;  Wang, Suhang;  Liang, Zhimin;  Yao, Di;  Zhou, Jihua;  Zhang, Yujun
收藏  |  浏览/下载:39/0  |  提交时间:2021/12/01
Anomaly detection  Semi-supervised learning  Generative adversarial networks  Self-learning