CSpace

浏览/检索结果: 共3条,第1-3条 帮助

已选(0)清除 条数/页:   排序方式:
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
Truth Discovery by Claim and Source Embedding 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 卷号: 33, 期号: 3, 页码: 1264-1275
作者:  Lyu, Shanshan;  Ouyang, Wentao;  Wang, Yongqing;  Shen, Huawei;  Cheng, Xueqi
收藏  |  浏览/下载:39/0  |  提交时间:2021/12/01
Reliability  Object oriented modeling  Iterative methods  Probabilistic logic  Data science  Computer aided software engineering  Data models  Truth discovery  crowdsourcing  representation learning  
Three-dimensional reconstruction using an adaptive simultaneous algebraic reconstruction technique in electron tomography 期刊论文
JOURNAL OF STRUCTURAL BIOLOGY, 2011, 卷号: 175, 期号: 3, 页码: 277-287
作者:  Wan, Xiaohua;  Zhang, Fa;  Chu, Qi;  Zhang, Kai;  Sun, Fei;  Yuan, Bo;  Liu, Zhiyong
收藏  |  浏览/下载:65/0  |  提交时间:2019/12/16
Electron tomography  Three-dimensional reconstruction  Iterative methods  ASART (adaptive simultaneous algebraic reconstruction technique)