×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术研... [8]
作者
Cheng, Xue... [3]
Cao, Qi [2]
Hou, Liang [2]
Hu, Xing [2]
Huang, Qin... [2]
Shen, Huaw... [2]
更多...
文献类型
期刊论文 [10]
发表日期
2024 [2]
2023 [3]
2022 [2]
2021 [3]
语种
英语 [10]
出处
IEEE TRANS... [2]
ACM TRANSA... [1]
ACM TRANSA... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
更多...
资助项目
Alibaba Gr... [1]
Beijing Ac... [1]
Beijing Na... [1]
China Post... [1]
China Post... [1]
Fundamenta... [1]
更多...
收录类别
SCI [10]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
文献类型:期刊论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
Graph Adversarial Immunization for Certifiable Robustness
期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
;
Cheng, Xueqi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/05/20
Adversarial attack
adversarial immunization
certifiable robustness
graph neural networks
node classification
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
;
Wang, Ying
;
Zhao, Yongwei
;
Du, Zidong
;
Guo, Qi
;
Wang, Yanzhi
;
Zhang, Xishan
;
Chen, Tianshi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time
Adversarial camouflage for node injection attack on graphs
期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
;
Sun, Fei
;
Cheng, Xueqi
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/12/04
Adversarial camouflage
Node injection attack
Adversarial attack
Graph neural networks
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models
期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:
Wu, Chen
;
Zhang, Ruqing
;
Guo, Jiafeng
;
De Rijke, Maarten
;
Fan, Yixing
;
Cheng, Xueqi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Adversarial attack
decision-based black-box attack setting
neural ranking models
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:
Lv, Hao
;
Li, Bing
;
Zhang, Lei
;
Liu, Cheng
;
Wang, Ying
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Security
Hardware
Neuromorphic engineering
Computational modeling
Circuit faults
Resistance
Immune system
Adversarial attack
fault injection attack
neuromorphic computing system (NCS)
processing in memory
reliability
resistive memory
Poisoning Attack Against Estimating From Pairwise Comparisons
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 卷号: 44, 期号: 10, 页码: 6393-6408
作者:
Ma, Ke
;
Xu, Qianqian
;
Zeng, Jinshan
;
Cao, Xiaochun
;
Huang, Qingming
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2022/12/07
Optimization
Heuristic algorithms
Sports
Voting
Uncertainty
Games
Data models
Adversarial learning
poisoning attack
pairwise comparison
rank aggregation
robust game
distributionally robust optimization
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:
Zhu, Yao
;
Chen, Yuefeng
;
Li, Xiaodan
;
Chen, Kejiang
;
He, Yuan
;
Tian, Xiang
;
Zheng, Bolun
;
Chen, Yaowu
;
Huang, Qingming
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/07/12
Data models
Perturbation methods
Iterative methods
Training
Distributed databases
Predictive models
Neural networks
Adversarial transferability
adversarial attack
black-box attack
Learning to Fool the Speaker Recognition
期刊论文
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 卷号: 17, 期号: 3, 页码: 21
作者:
Li, Jiguo
;
Zhang, Xinfeng
;
Xu, Jizheng
;
Ma, Siwei
;
Gao, Wen
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/12/07
Audio forensics
adversarial attack
deep neural network
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Liang, Ling
;
Hu, Xing
;
Deng, Lei
;
Wu, Yujie
;
Li, Guoqi
;
Ding, Yufei
;
Li, Peng
;
Xie, Yuan
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/06/21
Spatiotemporal phenomena
Computational modeling
Perturbation methods
Biological neural networks
Backpropagation
Unsupervised learning
Training
Adversarial attack
backpropagation through time (BPTT)
neuromorphic computing
spike-compatible gradient
spiking neural networks (SNNs)
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 56-69
作者:
Wang, Guoqing
;
Han, Hu
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:267/0
  |  
提交时间:2020/12/10
Face
Feature extraction
Testing
Adaptation models
Databases
Deep learning
Three-dimensional displays
Face presentation attack detection
face liveness detection
face anti-spoofing
adversarial domain adaptation
metric learning
disentangled representation