CSpace

浏览/检索结果: 共21条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Graph Adversarial Immunization for Certifiable Robustness 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Cheng, Xueqi
收藏  |  浏览/下载:7/0  |  提交时间:2024/05/20
Adversarial attack  adversarial immunization  certifiable robustness  graph neural networks  node classification  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:7/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
Adversarial camouflage for node injection attack on graphs 期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Sun, Fei;  Cheng, Xueqi
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Adversarial camouflage  Node injection attack  Adversarial attack  Graph neural networks  
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:  Wu, Chen;  Zhang, Ruqing;  Guo, Jiafeng;  De Rijke, Maarten;  Fan, Yixing;  Cheng, Xueqi
收藏  |  浏览/下载:11/0  |  提交时间:2023/12/04
Adversarial attack  decision-based black-box attack setting  neural ranking models  
Rethinking Label Flipping Attack: From Sample Masking to Sample Thresholding 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 6, 页码: 7668-7685
作者:  Xu, Qianqian;  Yang, Zhiyong;  Zhao, Yunrui;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:11/0  |  提交时间:2023/12/04
Data models  Training data  Training  Deep learning  Predictive models  Testing  Optimization  Label flipping attack  machine learning  
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:  Lv, Hao;  Li, Bing;  Zhang, Lei;  Liu, Cheng;  Wang, Ying
收藏  |  浏览/下载:11/0  |  提交时间:2023/12/04
Security  Hardware  Neuromorphic engineering  Computational modeling  Circuit faults  Resistance  Immune system  Adversarial attack  fault injection attack  neuromorphic computing system (NCS)  processing in memory  reliability  resistive memory  
Poisoning Attack Against Estimating From Pairwise Comparisons 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 卷号: 44, 期号: 10, 页码: 6393-6408
作者:  Ma, Ke;  Xu, Qianqian;  Zeng, Jinshan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:34/0  |  提交时间:2022/12/07
Optimization  Heuristic algorithms  Sports  Voting  Uncertainty  Games  Data models  Adversarial learning  poisoning attack  pairwise comparison  rank aggregation  robust game  distributionally robust optimization  
Attention-guided transformation-invariant attack for black-box adversarial examples 期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:  Zhu, Jiaqi;  Dai, Feng;  Yu, Lingyun;  Xie, Hongtao;  Wang, Lidong;  Wu, Bo;  Zhang, Yongdong
收藏  |  浏览/下载:25/0  |  提交时间:2022/12/07
adversarial examples  attention  media convergence  security  transformation-invariant  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:19/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
Learning to Fool the Speaker Recognition 期刊论文
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 卷号: 17, 期号: 3, 页码: 21
作者:  Li, Jiguo;  Zhang, Xinfeng;  Xu, Jizheng;  Ma, Siwei;  Gao, Wen
收藏  |  浏览/下载:22/0  |  提交时间:2022/12/07
Audio forensics  adversarial attack  deep neural network