CSpace

浏览/检索结果: 共12条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation  
Graph Adversarial Immunization for Certifiable Robustness 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Cheng, Xueqi
收藏  |  浏览/下载:12/0  |  提交时间:2024/05/20
Adversarial attack  adversarial immunization  certifiable robustness  graph neural networks  node classification  
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:  Fan, Xinxin;  Li, Mengfan;  Zhou, Jia;  Jing, Quanliang;  Lin, Chi;  Lu, Yunfeng;  Bi, Jingping
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Closed box  Perturbation methods  Predictive models  Indexes  Training  Glass box  Optimization  Deep learning  adversarial examples  black-box adversarial attack  transferability  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:11/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
Adversarial camouflage for node injection attack on graphs 期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Sun, Fei;  Cheng, Xueqi
收藏  |  浏览/下载:22/0  |  提交时间:2023/12/04
Adversarial camouflage  Node injection attack  Adversarial attack  Graph neural networks  
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:  Wu, Chen;  Zhang, Ruqing;  Guo, Jiafeng;  De Rijke, Maarten;  Fan, Yixing;  Cheng, Xueqi
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Adversarial attack  decision-based black-box attack setting  neural ranking models  
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:  Lv, Hao;  Li, Bing;  Zhang, Lei;  Liu, Cheng;  Wang, Ying
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Security  Hardware  Neuromorphic engineering  Computational modeling  Circuit faults  Resistance  Immune system  Adversarial attack  fault injection attack  neuromorphic computing system (NCS)  processing in memory  reliability  resistive memory  
Poisoning Attack Against Estimating From Pairwise Comparisons 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 卷号: 44, 期号: 10, 页码: 6393-6408
作者:  Ma, Ke;  Xu, Qianqian;  Zeng, Jinshan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:38/0  |  提交时间:2022/12/07
Optimization  Heuristic algorithms  Sports  Voting  Uncertainty  Games  Data models  Adversarial learning  poisoning attack  pairwise comparison  rank aggregation  robust game  distributionally robust optimization  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:23/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
Learning to Fool the Speaker Recognition 期刊论文
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 卷号: 17, 期号: 3, 页码: 21
作者:  Li, Jiguo;  Zhang, Xinfeng;  Xu, Jizheng;  Ma, Siwei;  Gao, Wen
收藏  |  浏览/下载:25/0  |  提交时间:2022/12/07
Audio forensics  adversarial attack  deep neural network