CSpace

浏览/检索结果: 共6条,第1-6条 帮助

已选(0)清除 条数/页:   排序方式:
Revisiting Edge Perturbation for Graph Neural Network in Graph Data Augmentation and Attack 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 卷号: 37, 期号: 7, 页码: 4225-4238
作者:  Liu, Xin;  Zhang, Yuxiang;  Wu, Meng;  Yan, Mingyu;  He, Kun;  Yan, Wei;  Pan, Shirui;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:11/0  |  提交时间:2025/12/03
Perturbation methods  Graph neural networks  Image edge detection  Data augmentation  Accuracy  Training  Measurement  Optimization  Detectors  World Wide Web  Edge perturbation  graph neural network  graph data augmentation  graph data attack  
AUCPro: AUC-Oriented Provable Robustness Learning 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2025, 卷号: 47, 期号: 6, 页码: 4579-4596
作者:  Bao, Shilong;  Xu, Qianqian;  Yang, Zhiyong;  He, Yuan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:10/0  |  提交时间:2025/12/03
Robustness  Training  Perturbation methods  Machine learning  Heavily-tailed distribution  Smoothing methods  Gaussian noise  Data mining  Standards  Protocols  AUC-oriented learning  adversarial robustness  machine learning  
MaxMatch: Semi-Supervised Learning With Worst-Case Consistency 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5970-5987
作者:  Jiang, Yangbangyan;  Li, Xiaodan;  Chen, Yuefeng;  He, Yuan;  Xu, Qianqian;  Yang, Zhiyong;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:51/0  |  提交时间:2023/12/04
Predictive models  Training  Data models  Semantics  Perturbation methods  Computational modeling  Benchmark testing  Semi-supervised learning  consistency regularization  worst-case consistency  image classification  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:57/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:  Lan, Yazhu;  Nixon, Kent W.;  Guo, Qingli;  Zhang, Guohe;  Xu, Yuanchao;  Li, Hai;  Chen, Yiran
收藏  |  浏览/下载:105/0  |  提交时间:2021/12/01
Perturbation methods  Computational modeling  Data integrity  Detectors  Optimization  Field programmable gate arrays  Hardware  Adversarial attacks  confidence detection  deep neural networks (DNNs)  FPGA-based hardware architecture  sensor pattern noise (SPN)  
A semi-supervised privacy-preserving clustering algorithm for healthcare 期刊论文
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 卷号: 9, 期号: 5, 页码: 864-875
作者:  Huang, Meiyu;  Chen, Yiqiang;  Chen, Bo-Wei;  Liu, Junfa;  Rho, Seungmin;  Ji, Wen
收藏  |  浏览/下载:77/0  |  提交时间:2019/12/13
Privacy-preserving cloud clustering  Data perturbation  Semi-supervised  Large margin nearest cluster metric  Brain fiber