CSpace

浏览/检索结果: 共19条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A prompt-based approach to adversarial example generation and robustness enhancement 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2024, 卷号: 18, 期号: 4, 页码: 12
作者:  Yang, Yuting;  Huang, Pei;  Cao, Juan;  Li, Jintao;  Lin, Yun;  Ma, Feifei
收藏  |  浏览/下载:0/0  |  提交时间:2024/05/20
robustness  adversarial example  prompt learning  pre-trained language model  
Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 15494-15511
作者:  Yang, Zhiyong;  Xu, Qianqian;  Hou, Wenzheng;  Bao, Shilong;  He, Yuan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:0/0  |  提交时间:2024/05/20
Optimization  Training  Perturbation methods  Machine learning  Receivers  Machine learning algorithms  Linear programming  AUC Optimization  adversarial learning  machine learning  
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:  Wu, Chen;  Zhang, Ruqing;  Guo, Jiafeng;  De Rijke, Maarten;  Fan, Yixing;  Cheng, Xueqi
收藏  |  浏览/下载:6/0  |  提交时间:2023/12/04
Adversarial attack  decision-based black-box attack setting  neural ranking models  
General Greedy De-Bias Learning 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 8, 页码: 9789-9805
作者:  Han, Xinzhe;  Wang, Shuhui;  Su, Chi;  Huang, Qingming;  Tian, Qi
收藏  |  浏览/下载:6/0  |  提交时间:2023/12/04
Task analysis  Correlation  Training  Data models  Question answering (information retrieval)  Visualization  Image classification  Curriculum learning  dataset biases  greedy strategy  robust learning  
Attention-guided transformation-invariant attack for black-box adversarial examples 期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:  Zhu, Jiaqi;  Dai, Feng;  Yu, Lingyun;  Xie, Hongtao;  Wang, Lidong;  Wu, Bo;  Zhang, Yongdong
收藏  |  浏览/下载:16/0  |  提交时间:2022/12/07
adversarial examples  attention  media convergence  security  transformation-invariant  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:12/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack  
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:  Liang, Ling;  Hu, Xing;  Deng, Lei;  Wu, Yujie;  Li, Guoqi;  Ding, Yufei;  Li, Peng;  Xie, Yuan
收藏  |  浏览/下载:24/0  |  提交时间:2022/06/21
Spatiotemporal phenomena  Computational modeling  Perturbation methods  Biological neural networks  Backpropagation  Unsupervised learning  Training  Adversarial attack  backpropagation through time (BPTT)  neuromorphic computing  spike-compatible gradient  spiking neural networks (SNNs)  
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:  Lan, Yazhu;  Nixon, Kent W.;  Guo, Qingli;  Zhang, Guohe;  Xu, Yuanchao;  Li, Hai;  Chen, Yiran
收藏  |  浏览/下载:38/0  |  提交时间:2021/12/01
Perturbation methods  Computational modeling  Data integrity  Detectors  Optimization  Field programmable gate arrays  Hardware  Adversarial attacks  confidence detection  deep neural networks (DNNs)  FPGA-based hardware architecture  sensor pattern noise (SPN)  
INOR-An Intelligent noise reduction method to defend against adversarial audio examples 期刊论文
NEUROCOMPUTING, 2020, 卷号: 401, 页码: 160-172
作者:  Guo, Qingli;  Ye, Jing;  Chen, Yiran;  Hu, Yu;  Lan, Yazhu;  Zhang, Guohe;  Li, Xiaowei
收藏  |  浏览/下载:50/0  |  提交时间:2020/12/10
Adversarial audio examples  Defense against adversarial audio examples  INOR  
MultiPAD: A Multivariant Partition-Based Method for Audio Adversarial Examples Detection 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 63368-63380
作者:  Guo, Qingli;  Ye, Jing;  Hu, Yu;  Zhang, Guohe;  Li, Xiaowei;  Li, Huawei
收藏  |  浏览/下载:41/0  |  提交时间:2020/12/10
Speech recognition  Feature extraction  Decoding  Mathematical model  Acoustics  Psychoacoustic models  Radio frequency  Adversarial examples  audio  detection  multivariant partition