CSpace

浏览/检索结果: 共9条,第1-9条 帮助

已选(0)清除 条数/页:   排序方式:
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation  
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:  Fan, Xinxin;  Li, Mengfan;  Zhou, Jia;  Jing, Quanliang;  Lin, Chi;  Lu, Yunfeng;  Bi, Jingping
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Closed box  Perturbation methods  Predictive models  Indexes  Training  Glass box  Optimization  Deep learning  adversarial examples  black-box adversarial attack  transferability  
Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 15494-15511
作者:  Yang, Zhiyong;  Xu, Qianqian;  Hou, Wenzheng;  Bao, Shilong;  He, Yuan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:12/0  |  提交时间:2024/05/20
Optimization  Training  Perturbation methods  Machine learning  Receivers  Machine learning algorithms  Linear programming  AUC Optimization  adversarial learning  machine learning  
Characterizing and Understanding Defense Methods for GNNs on GPUs 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:  Wu, Meng;  Yan, Mingyu;  Yang, Xiaocheng;  Li, Wenming;  Zhang, Zhimin;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:17/0  |  提交时间:2023/12/04
Kernel  Purification  Estimation  Graphics processing units  Perturbation methods  Electric breakdown  Training  Graph neural networks  defense  execution semantic  execution pattern  overhead  
MaxMatch: Semi-Supervised Learning With Worst-Case Consistency 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5970-5987
作者:  Jiang, Yangbangyan;  Li, Xiaodan;  Chen, Yuefeng;  He, Yuan;  Xu, Qianqian;  Yang, Zhiyong;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Predictive models  Training  Data models  Semantics  Perturbation methods  Computational modeling  Benchmark testing  Semi-supervised learning  consistency regularization  worst-case consistency  image classification  
All-Around Real Label Supervision: Cyclic Prototype Consistency Learning for Semi-Supervised Medical Image Segmentation 期刊论文
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 卷号: 26, 期号: 7, 页码: 3174-3184
作者:  Xu, Zhe;  Wang, Yixin;  Lu, Donghuan;  Yu, Lequan;  Yan, Jiangpeng;  Luo, Jie;  Ma, Kai;  Zheng, Yefeng;  Tong, Raymond Kai-yu
收藏  |  浏览/下载:28/0  |  提交时间:2022/12/07
Image segmentation  Prototypes  Biomedical imaging  Perturbation methods  Reliability  Feature extraction  Training  Medical image segmentation  prototype learning  semi-supervised learning  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:23/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:  Liang, Ling;  Hu, Xing;  Deng, Lei;  Wu, Yujie;  Li, Guoqi;  Ding, Yufei;  Li, Peng;  Xie, Yuan
收藏  |  浏览/下载:36/0  |  提交时间:2022/06/21
Spatiotemporal phenomena  Computational modeling  Perturbation methods  Biological neural networks  Backpropagation  Unsupervised learning  Training  Adversarial attack  backpropagation through time (BPTT)  neuromorphic computing  spike-compatible gradient  spiking neural networks (SNNs)  
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:  Lan, Yazhu;  Nixon, Kent W.;  Guo, Qingli;  Zhang, Guohe;  Xu, Yuanchao;  Li, Hai;  Chen, Yiran
收藏  |  浏览/下载:49/0  |  提交时间:2021/12/01
Perturbation methods  Computational modeling  Data integrity  Detectors  Optimization  Field programmable gate arrays  Hardware  Adversarial attacks  confidence detection  deep neural networks (DNNs)  FPGA-based hardware architecture  sensor pattern noise (SPN)