CSpace

浏览/检索结果: 共33条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Peak-controlled logits poisoning attack in federated distillation 期刊论文
DISCOVER COMPUTING, 2025, 卷号: 28, 期号: 1, 页码: 18
作者:  Tang, Yuhan;  Wu, Zhiyuan;  Gao, Bo;  Wen, Tian;  Wang, Yuwei;  Sun, Sheng
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Federated learning  Knowledge distillation  Knowledge transfer  Poisoning attack  Misleading attack  
Revisiting Edge Perturbation for Graph Neural Network in Graph Data Augmentation and Attack 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 卷号: 37, 期号: 7, 页码: 4225-4238
作者:  Liu, Xin;  Zhang, Yuxiang;  Wu, Meng;  Yan, Mingyu;  He, Kun;  Yan, Wei;  Pan, Shirui;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Perturbation methods  Graph neural networks  Image edge detection  Data augmentation  Accuracy  Training  Measurement  Optimization  Detectors  World Wide Web  Edge perturbation  graph neural network  graph data augmentation  graph data attack  
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 卷号: 20, 页码: 2464-2479
作者:  Xue, Jingjing;  Sun, Sheng;  Liu, Min;  Li, Qi;  Xu, Ke
收藏  |  浏览/下载:40/0  |  提交时间:2025/06/25
Bayes methods  Training  Servers  Data models  Robustness  Distributed databases  Uplink  Convergence  Computational modeling  Recurrent neural networks  Federated learning  Byzantine attack  dropout defense  robust aggregation  
Securing the internet's backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense 期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:  Fu, Yufan;  Lee, Xiaodong;  Wei, Jiuqi;  Li, Ying;  Peng, Botao
收藏  |  浏览/下载:34/0  |  提交时间:2024/12/06
DNS  Cache poisoning attack  Blockchain  Smart contract  Incentive mechanism  
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:35/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation  
Towards Robust Semantic Segmentation against Patch-Based Attack via Attention Refinement 期刊论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024, 页码: 23
作者:  Yuan, Zheng;  Zhang, Jie;  Wang, Yude;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:42/0  |  提交时间:2024/12/06
Model robustness  Attention mechanism  Semantic segmentation  Patch-based attack  
Graph Adversarial Immunization for Certifiable Robustness 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Cheng, Xueqi
收藏  |  浏览/下载:47/0  |  提交时间:2024/05/20
Adversarial attack  adversarial immunization  certifiable robustness  graph neural networks  node classification  
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:  Fan, Xinxin;  Li, Mengfan;  Zhou, Jia;  Jing, Quanliang;  Lin, Chi;  Lu, Yunfeng;  Bi, Jingping
收藏  |  浏览/下载:41/0  |  提交时间:2024/12/06
Closed box  Perturbation methods  Predictive models  Indexes  Training  Glass box  Optimization  Deep learning  adversarial examples  black-box adversarial attack  transferability  
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:  Liu, Zizhen;  He, Weiyang;  Chang, Chip-Hong;  Ye, Jing;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:38/0  |  提交时间:2024/12/06
Data models  Servers  Training  Hidden Markov models  Training data  Adaptation models  Security  Federated learning  poisoning attack  knowledge distillation  attention maps  deep neural network  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:51/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time