CSpace

浏览/检索结果: 共30条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Securing the internet's backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense 期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:  Fu, Yufan;  Lee, Xiaodong;  Wei, Jiuqi;  Li, Ying;  Peng, Botao
收藏  |  浏览/下载:5/0  |  提交时间:2024/12/06
DNS  Cache poisoning attack  Blockchain  Smart contract  Incentive mechanism  
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:6/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation  
Towards Robust Semantic Segmentation against Patch-Based Attack via Attention Refinement 期刊论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024, 页码: 23
作者:  Yuan, Zheng;  Zhang, Jie;  Wang, Yude;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:8/0  |  提交时间:2024/12/06
Model robustness  Attention mechanism  Semantic segmentation  Patch-based attack  
Graph Adversarial Immunization for Certifiable Robustness 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Cheng, Xueqi
收藏  |  浏览/下载:18/0  |  提交时间:2024/05/20
Adversarial attack  adversarial immunization  certifiable robustness  graph neural networks  node classification  
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:  Fan, Xinxin;  Li, Mengfan;  Zhou, Jia;  Jing, Quanliang;  Lin, Chi;  Lu, Yunfeng;  Bi, Jingping
收藏  |  浏览/下载:7/0  |  提交时间:2024/12/06
Closed box  Perturbation methods  Predictive models  Indexes  Training  Glass box  Optimization  Deep learning  adversarial examples  black-box adversarial attack  transferability  
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:  Liu, Zizhen;  He, Weiyang;  Chang, Chip-Hong;  Ye, Jing;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:8/0  |  提交时间:2024/12/06
Data models  Servers  Training  Hidden Markov models  Training data  Adaptation models  Security  Federated learning  poisoning attack  knowledge distillation  attention maps  deep neural network  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:17/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:  Tang, Bowen;  Wu, Chenggang;  Yew, Pen-Chung;  Zhang, Yinqian;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Wang, Wei;  Wei, Qiang;  Wang, Zhe
收藏  |  浏览/下载:46/0  |  提交时间:2024/05/20
Resource contention  scheduling strategy  simultaneous multithreading (SMT)  transient execution attack (TEA)  
Adversarial camouflage for node injection attack on graphs 期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Sun, Fei;  Cheng, Xueqi
收藏  |  浏览/下载:30/0  |  提交时间:2023/12/04
Adversarial camouflage  Node injection attack  Adversarial attack  Graph neural networks  
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:  Wu, Chen;  Zhang, Ruqing;  Guo, Jiafeng;  De Rijke, Maarten;  Fan, Yixing;  Cheng, Xueqi
收藏  |  浏览/下载:19/0  |  提交时间:2023/12/04
Adversarial attack  decision-based black-box attack setting  neural ranking models