CSpace

浏览/检索结果: 共3条,第1-3条 帮助

已选(0)清除 条数/页:   排序方式:
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:  Fan, Xinxin;  Li, Mengfan;  Zhou, Jia;  Jing, Quanliang;  Lin, Chi;  Lu, Yunfeng;  Bi, Jingping
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Closed box  Perturbation methods  Predictive models  Indexes  Training  Glass box  Optimization  Deep learning  adversarial examples  black-box adversarial attack  transferability  
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:  Wu, Chen;  Zhang, Ruqing;  Guo, Jiafeng;  De Rijke, Maarten;  Fan, Yixing;  Cheng, Xueqi
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Adversarial attack  decision-based black-box attack setting  neural ranking models  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:23/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack