×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [33]
作者
Shan, Shig... [5]
Zhang, Jie [4]
Chen, Xili... [3]
Cheng, Xue... [3]
Hu, Xing [3]
Huang, Qin... [3]
更多...
文献类型
期刊论文 [33]
发表日期
2025 [3]
2024 [7]
2023 [6]
2022 [6]
2021 [6]
2020 [1]
更多...
语种
英语 [33]
出处
IEEE TRANS... [7]
IEEE TRANS... [5]
IEEE TRANS... [3]
IEEE TRANS... [2]
ACM TRANSA... [1]
ACM TRANSA... [1]
更多...
资助项目
Youth Inno... [4]
Fundamenta... [3]
Beijing No... [2]
Key Labora... [2]
National K... [2]
National N... [2]
更多...
收录类别
SCI [33]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共33条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
Peak-controlled logits poisoning attack in federated distillation
期刊论文
DISCOVER COMPUTING, 2025, 卷号: 28, 期号: 1, 页码: 18
作者:
Tang, Yuhan
;
Wu, Zhiyuan
;
Gao, Bo
;
Wen, Tian
;
Wang, Yuwei
;
Sun, Sheng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/12/03
Federated learning
Knowledge distillation
Knowledge transfer
Poisoning attack
Misleading attack
Revisiting Edge Perturbation for Graph Neural Network in Graph Data Augmentation and Attack
期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 卷号: 37, 期号: 7, 页码: 4225-4238
作者:
Liu, Xin
;
Zhang, Yuxiang
;
Wu, Meng
;
Yan, Mingyu
;
He, Kun
;
Yan, Wei
;
Pan, Shirui
;
Ye, Xiaochun
;
Fan, Dongrui
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/12/03
Perturbation methods
Graph neural networks
Image edge detection
Data augmentation
Accuracy
Training
Measurement
Optimization
Detectors
World Wide Web
Edge perturbation
graph neural network
graph data augmentation
graph data attack
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 卷号: 20, 页码: 2464-2479
作者:
Xue, Jingjing
;
Sun, Sheng
;
Liu, Min
;
Li, Qi
;
Xu, Ke
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2025/06/25
Bayes methods
Training
Servers
Data models
Robustness
Distributed databases
Uplink
Convergence
Computational modeling
Recurrent neural networks
Federated learning
Byzantine attack
dropout defense
robust aggregation
Securing the internet's backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense
期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:
Fu, Yufan
;
Lee, Xiaodong
;
Wei, Jiuqi
;
Li, Ying
;
Peng, Botao
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2024/12/06
DNS
Cache poisoning attack
Blockchain
Smart contract
Incentive mechanism
Adaptive Perturbation for Adversarial Attack
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:
Yuan, Zheng
;
Zhang, Jie
;
Jiang, Zhaoyan
;
Li, Liangliang
;
Shan, Shiguang
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2024/12/06
Perturbation methods
Iterative methods
Adaptation models
Generators
Closed box
Security
Training
Adversarial attack
transfer-based attack
adversarial example
adaptive perturbation
Towards Robust Semantic Segmentation against Patch-Based Attack via Attention Refinement
期刊论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024, 页码: 23
作者:
Yuan, Zheng
;
Zhang, Jie
;
Wang, Yude
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2024/12/06
Model robustness
Attention mechanism
Semantic segmentation
Patch-based attack
Graph Adversarial Immunization for Certifiable Robustness
期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
;
Cheng, Xueqi
收藏
  |  
浏览/下载:47/0
  |  
提交时间:2024/05/20
Adversarial attack
adversarial immunization
certifiable robustness
graph neural networks
node classification
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:
Fan, Xinxin
;
Li, Mengfan
;
Zhou, Jia
;
Jing, Quanliang
;
Lin, Chi
;
Lu, Yunfeng
;
Bi, Jingping
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2024/12/06
Closed box
Perturbation methods
Predictive models
Indexes
Training
Glass box
Optimization
Deep learning
adversarial examples
black-box adversarial attack
transferability
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:
Liu, Zizhen
;
He, Weiyang
;
Chang, Chip-Hong
;
Ye, Jing
;
Li, Huawei
;
Li, Xiaowei
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2024/12/06
Data models
Servers
Training
Hidden Markov models
Training data
Adaptation models
Security
Federated learning
poisoning attack
knowledge distillation
attention maps
deep neural network
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
;
Wang, Ying
;
Zhao, Yongwei
;
Du, Zidong
;
Guo, Qi
;
Wang, Yanzhi
;
Zhang, Xishan
;
Chen, Tianshi
收藏
  |  
浏览/下载:51/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time