CSpace

浏览/检索结果: 共3条,第1-3条 帮助

已选(0)清除 条数/页:   排序方式:
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation  
A prompt-based approach to adversarial example generation and robustness enhancement 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2024, 卷号: 18, 期号: 4, 页码: 12
作者:  Yang, Yuting;  Huang, Pei;  Cao, Juan;  Li, Jintao;  Lin, Yun;  Ma, Feifei
收藏  |  浏览/下载:13/0  |  提交时间:2024/05/20
robustness  adversarial example  prompt learning  pre-trained language model  
Identity-Preserving Adversarial Training for Robust Network Embedding 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2024, 卷号: 39, 期号: 1, 页码: 177-191
作者:  Cen, Ke-Ting;  Shen, Hua-Wei;  Cao, Qi;  Xu, Bing-Bing;  Cheng, Xue-Qi
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
network embedding  identity-preserving  adversarial training  adversarial the example