CSpace

浏览/检索结果: 共12条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A Generic Layer Pruning Method for Signal Modulation Recognition Deep Learning Models 期刊论文
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2025, 卷号: 11, 期号: 4, 页码: 2123-2134
作者:  Lu, Yao;  Zhu, Yutao;  Li, Yuqi;  Xu, Dongwei;  Lin, Yun;  Xuan, Qi;  Yang, Xiaoniu
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Computational modeling  Deep learning  Modulation  Training  Pattern classification  Computational complexity  Vectors  Semantics  Perturbation methods  Indexes  Automatic modulation recognition  layer pruning  deep learning  edge devices  
Revisiting Edge Perturbation for Graph Neural Network in Graph Data Augmentation and Attack 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 卷号: 37, 期号: 7, 页码: 4225-4238
作者:  Liu, Xin;  Zhang, Yuxiang;  Wu, Meng;  Yan, Mingyu;  He, Kun;  Yan, Wei;  Pan, Shirui;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Perturbation methods  Graph neural networks  Image edge detection  Data augmentation  Accuracy  Training  Measurement  Optimization  Detectors  World Wide Web  Edge perturbation  graph neural network  graph data augmentation  graph data attack  
AUCPro: AUC-Oriented Provable Robustness Learning 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2025, 卷号: 47, 期号: 6, 页码: 4579-4596
作者:  Bao, Shilong;  Xu, Qianqian;  Yang, Zhiyong;  He, Yuan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Robustness  Training  Perturbation methods  Machine learning  Heavily-tailed distribution  Smoothing methods  Gaussian noise  Data mining  Standards  Protocols  AUC-oriented learning  adversarial robustness  machine learning  
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:36/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation  
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:  Fan, Xinxin;  Li, Mengfan;  Zhou, Jia;  Jing, Quanliang;  Lin, Chi;  Lu, Yunfeng;  Bi, Jingping
收藏  |  浏览/下载:41/0  |  提交时间:2024/12/06
Closed box  Perturbation methods  Predictive models  Indexes  Training  Glass box  Optimization  Deep learning  adversarial examples  black-box adversarial attack  transferability  
Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 15494-15511
作者:  Yang, Zhiyong;  Xu, Qianqian;  Hou, Wenzheng;  Bao, Shilong;  He, Yuan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:48/0  |  提交时间:2024/05/20
Optimization  Training  Perturbation methods  Machine learning  Receivers  Machine learning algorithms  Linear programming  AUC Optimization  adversarial learning  machine learning  
Characterizing and Understanding Defense Methods for GNNs on GPUs 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:  Wu, Meng;  Yan, Mingyu;  Yang, Xiaocheng;  Li, Wenming;  Zhang, Zhimin;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:56/0  |  提交时间:2023/12/04
Kernel  Purification  Estimation  Graphics processing units  Perturbation methods  Electric breakdown  Training  Graph neural networks  defense  execution semantic  execution pattern  overhead  
MaxMatch: Semi-Supervised Learning With Worst-Case Consistency 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5970-5987
作者:  Jiang, Yangbangyan;  Li, Xiaodan;  Chen, Yuefeng;  He, Yuan;  Xu, Qianqian;  Yang, Zhiyong;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:46/0  |  提交时间:2023/12/04
Predictive models  Training  Data models  Semantics  Perturbation methods  Computational modeling  Benchmark testing  Semi-supervised learning  consistency regularization  worst-case consistency  image classification  
All-Around Real Label Supervision: Cyclic Prototype Consistency Learning for Semi-Supervised Medical Image Segmentation 期刊论文
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 卷号: 26, 期号: 7, 页码: 3174-3184
作者:  Xu, Zhe;  Wang, Yixin;  Lu, Donghuan;  Yu, Lequan;  Yan, Jiangpeng;  Luo, Jie;  Ma, Kai;  Zheng, Yefeng;  Tong, Raymond Kai-yu
收藏  |  浏览/下载:74/0  |  提交时间:2022/12/07
Image segmentation  Prototypes  Biomedical imaging  Perturbation methods  Reliability  Feature extraction  Training  Medical image segmentation  prototype learning  semi-supervised learning  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:50/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack