CSpace

浏览/检索结果: 共10条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Graph Adversarial Immunization for Certifiable Robustness 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Cheng, Xueqi
收藏  |  浏览/下载:2/0  |  提交时间:2024/05/20
Adversarial attack  adversarial immunization  certifiable robustness  graph neural networks  node classification  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:3/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
Adversarial camouflage for node injection attack on graphs 期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Sun, Fei;  Cheng, Xueqi
收藏  |  浏览/下载:8/0  |  提交时间:2023/12/04
Adversarial camouflage  Node injection attack  Adversarial attack  Graph neural networks  
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:  Wu, Chen;  Zhang, Ruqing;  Guo, Jiafeng;  De Rijke, Maarten;  Fan, Yixing;  Cheng, Xueqi
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Adversarial attack  decision-based black-box attack setting  neural ranking models  
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:  Lv, Hao;  Li, Bing;  Zhang, Lei;  Liu, Cheng;  Wang, Ying
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Security  Hardware  Neuromorphic engineering  Computational modeling  Circuit faults  Resistance  Immune system  Adversarial attack  fault injection attack  neuromorphic computing system (NCS)  processing in memory  reliability  resistive memory  
Poisoning Attack Against Estimating From Pairwise Comparisons 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 卷号: 44, 期号: 10, 页码: 6393-6408
作者:  Ma, Ke;  Xu, Qianqian;  Zeng, Jinshan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:29/0  |  提交时间:2022/12/07
Optimization  Heuristic algorithms  Sports  Voting  Uncertainty  Games  Data models  Adversarial learning  poisoning attack  pairwise comparison  rank aggregation  robust game  distributionally robust optimization  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
Learning to Fool the Speaker Recognition 期刊论文
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 卷号: 17, 期号: 3, 页码: 21
作者:  Li, Jiguo;  Zhang, Xinfeng;  Xu, Jizheng;  Ma, Siwei;  Gao, Wen
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
Audio forensics  adversarial attack  deep neural network  
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:  Liang, Ling;  Hu, Xing;  Deng, Lei;  Wu, Yujie;  Li, Guoqi;  Ding, Yufei;  Li, Peng;  Xie, Yuan
收藏  |  浏览/下载:26/0  |  提交时间:2022/06/21
Spatiotemporal phenomena  Computational modeling  Perturbation methods  Biological neural networks  Backpropagation  Unsupervised learning  Training  Adversarial attack  backpropagation through time (BPTT)  neuromorphic computing  spike-compatible gradient  spiking neural networks (SNNs)  
Unsupervised Adversarial Domain Adaptation for Cross-Domain Face Presentation Attack Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 56-69
作者:  Wang, Guoqing;  Han, Hu;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:267/0  |  提交时间:2020/12/10
Face  Feature extraction  Testing  Adaptation models  Databases  Deep learning  Three-dimensional displays  Face presentation attack detection  face liveness detection  face anti-spoofing  adversarial domain adaptation  metric learning  disentangled representation