CSpace

浏览/检索结果: 共4条,第1-4条 帮助

已选(0)清除 条数/页:   排序方式:
MaxMatch: Semi-Supervised Learning With Worst-Case Consistency 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5970-5987
作者:  Jiang, Yangbangyan;  Li, Xiaodan;  Chen, Yuefeng;  He, Yuan;  Xu, Qianqian;  Yang, Zhiyong;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:10/0  |  提交时间:2023/12/04
Predictive models  Training  Data models  Semantics  Perturbation methods  Computational modeling  Benchmark testing  Semi-supervised learning  consistency regularization  worst-case consistency  image classification  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:18/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:  Lan, Yazhu;  Nixon, Kent W.;  Guo, Qingli;  Zhang, Guohe;  Xu, Yuanchao;  Li, Hai;  Chen, Yiran
收藏  |  浏览/下载:43/0  |  提交时间:2021/12/01
Perturbation methods  Computational modeling  Data integrity  Detectors  Optimization  Field programmable gate arrays  Hardware  Adversarial attacks  confidence detection  deep neural networks (DNNs)  FPGA-based hardware architecture  sensor pattern noise (SPN)  
A semi-supervised privacy-preserving clustering algorithm for healthcare 期刊论文
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 卷号: 9, 期号: 5, 页码: 864-875
作者:  Huang, Meiyu;  Chen, Yiqiang;  Chen, Bo-Wei;  Liu, Junfa;  Rho, Seungmin;  Ji, Wen
收藏  |  浏览/下载:41/0  |  提交时间:2019/12/13
Privacy-preserving cloud clustering  Data perturbation  Semi-supervised  Large margin nearest cluster metric  Brain fiber