×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术研... [9]
作者
He, Yuan [3]
Huang, Qin... [3]
Cao, Xiaoc... [2]
Chen, Yuef... [2]
Li, Xiaoda... [2]
Xu, Qianqi... [2]
更多...
文献类型
期刊论文 [9]
发表日期
2024 [2]
2023 [3]
2022 [2]
2021 [1]
2020 [1]
语种
英语 [9]
出处
IEEE TRANS... [3]
IEEE COMPU... [1]
IEEE JOURN... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
更多...
资助项目
Fundamenta... [3]
Youth Inno... [3]
National K... [2]
National N... [2]
National N... [2]
National N... [2]
更多...
收录类别
SCI [9]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
Adaptive Perturbation for Adversarial Attack
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:
Yuan, Zheng
;
Zhang, Jie
;
Jiang, Zhaoyan
;
Li, Liangliang
;
Shan, Shiguang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Perturbation methods
Iterative methods
Adaptation models
Generators
Closed box
Security
Training
Adversarial attack
transfer-based attack
adversarial example
adaptive perturbation
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:
Fan, Xinxin
;
Li, Mengfan
;
Zhou, Jia
;
Jing, Quanliang
;
Lin, Chi
;
Lu, Yunfeng
;
Bi, Jingping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/12/06
Closed box
Perturbation methods
Predictive models
Indexes
Training
Glass box
Optimization
Deep learning
adversarial examples
black-box adversarial attack
transferability
Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 15494-15511
作者:
Yang, Zhiyong
;
Xu, Qianqian
;
Hou, Wenzheng
;
Bao, Shilong
;
He, Yuan
;
Cao, Xiaochun
;
Huang, Qingming
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2024/05/20
Optimization
Training
Perturbation methods
Machine learning
Receivers
Machine learning algorithms
Linear programming
AUC Optimization
adversarial learning
machine learning
Characterizing and Understanding Defense Methods for GNNs on GPUs
期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:
Wu, Meng
;
Yan, Mingyu
;
Yang, Xiaocheng
;
Li, Wenming
;
Zhang, Zhimin
;
Ye, Xiaochun
;
Fan, Dongrui
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2023/12/04
Kernel
Purification
Estimation
Graphics processing units
Perturbation methods
Electric breakdown
Training
Graph neural networks
defense
execution semantic
execution pattern
overhead
MaxMatch: Semi-Supervised Learning With Worst-Case Consistency
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5970-5987
作者:
Jiang, Yangbangyan
;
Li, Xiaodan
;
Chen, Yuefeng
;
He, Yuan
;
Xu, Qianqian
;
Yang, Zhiyong
;
Cao, Xiaochun
;
Huang, Qingming
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/12/04
Predictive models
Training
Data models
Semantics
Perturbation methods
Computational modeling
Benchmark testing
Semi-supervised learning
consistency regularization
worst-case consistency
image classification
All-Around Real Label Supervision: Cyclic Prototype Consistency Learning for Semi-Supervised Medical Image Segmentation
期刊论文
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 卷号: 26, 期号: 7, 页码: 3174-3184
作者:
Xu, Zhe
;
Wang, Yixin
;
Lu, Donghuan
;
Yu, Lequan
;
Yan, Jiangpeng
;
Luo, Jie
;
Ma, Kai
;
Zheng, Yefeng
;
Tong, Raymond Kai-yu
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2022/12/07
Image segmentation
Prototypes
Biomedical imaging
Perturbation methods
Reliability
Feature extraction
Training
Medical image segmentation
prototype learning
semi-supervised learning
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:
Zhu, Yao
;
Chen, Yuefeng
;
Li, Xiaodan
;
Chen, Kejiang
;
He, Yuan
;
Tian, Xiang
;
Zheng, Bolun
;
Chen, Yaowu
;
Huang, Qingming
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2023/07/12
Data models
Perturbation methods
Iterative methods
Training
Distributed databases
Predictive models
Neural networks
Adversarial transferability
adversarial attack
black-box attack
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Liang, Ling
;
Hu, Xing
;
Deng, Lei
;
Wu, Yujie
;
Li, Guoqi
;
Ding, Yufei
;
Li, Peng
;
Xie, Yuan
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2022/06/21
Spatiotemporal phenomena
Computational modeling
Perturbation methods
Biological neural networks
Backpropagation
Unsupervised learning
Training
Adversarial attack
backpropagation through time (BPTT)
neuromorphic computing
spike-compatible gradient
spiking neural networks (SNNs)
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
;
Li, Hai
;
Chen, Yiran
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)