×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术研... [9]
中国科学院计算技术研... [8]
作者
Guo, Qingl... [3]
Huang, Qin... [3]
Zhang, Guo... [3]
Chen, Yira... [2]
He, Yuan [2]
Hu, Yu [2]
更多...
文献类型
期刊论文 [11]
学位论文 [8]
发表日期
2024 [1]
2023 [3]
2022 [2]
2021 [1]
2020 [3]
2018 [5]
更多...
语种
英语 [11]
中文 [8]
出处
IEEE TRANS... [2]
ACM TRANSA... [1]
FRONTIERS ... [1]
IEEE ACCES... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
更多...
资助项目
Fundamenta... [2]
National K... [2]
National N... [2]
National N... [2]
National N... [2]
National N... [2]
更多...
收录类别
SCI [10]
其他 [1]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共19条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
A prompt-based approach to adversarial example generation and robustness enhancement
期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2024, 卷号: 18, 期号: 4, 页码: 12
作者:
Yang, Yuting
;
Huang, Pei
;
Cao, Juan
;
Li, Jintao
;
Lin, Yun
;
Ma, Feifei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/05/20
robustness
adversarial example
prompt learning
pre-trained language model
Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 15494-15511
作者:
Yang, Zhiyong
;
Xu, Qianqian
;
Hou, Wenzheng
;
Bao, Shilong
;
He, Yuan
;
Cao, Xiaochun
;
Huang, Qingming
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/05/20
Optimization
Training
Perturbation methods
Machine learning
Receivers
Machine learning algorithms
Linear programming
AUC Optimization
adversarial learning
machine learning
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models
期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:
Wu, Chen
;
Zhang, Ruqing
;
Guo, Jiafeng
;
De Rijke, Maarten
;
Fan, Yixing
;
Cheng, Xueqi
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/12/04
Adversarial attack
decision-based black-box attack setting
neural ranking models
General Greedy De-Bias Learning
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 8, 页码: 9789-9805
作者:
Han, Xinzhe
;
Wang, Shuhui
;
Su, Chi
;
Huang, Qingming
;
Tian, Qi
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/12/04
Task analysis
Correlation
Training
Data models
Question answering (information retrieval)
Visualization
Image classification
Curriculum learning
dataset biases
greedy strategy
robust learning
Attention-guided transformation-invariant attack for black-box adversarial examples
期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:
Zhu, Jiaqi
;
Dai, Feng
;
Yu, Lingyun
;
Xie, Hongtao
;
Wang, Lidong
;
Wu, Bo
;
Zhang, Yongdong
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/12/07
adversarial examples
attention
media convergence
security
transformation-invariant
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:
Zhu, Yao
;
Chen, Yuefeng
;
Li, Xiaodan
;
Chen, Kejiang
;
He, Yuan
;
Tian, Xiang
;
Zheng, Bolun
;
Chen, Yaowu
;
Huang, Qingming
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/07/12
Data models
Perturbation methods
Iterative methods
Training
Distributed databases
Predictive models
Neural networks
Adversarial transferability
adversarial attack
black-box attack
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Liang, Ling
;
Hu, Xing
;
Deng, Lei
;
Wu, Yujie
;
Li, Guoqi
;
Ding, Yufei
;
Li, Peng
;
Xie, Yuan
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/21
Spatiotemporal phenomena
Computational modeling
Perturbation methods
Biological neural networks
Backpropagation
Unsupervised learning
Training
Adversarial attack
backpropagation through time (BPTT)
neuromorphic computing
spike-compatible gradient
spiking neural networks (SNNs)
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
;
Li, Hai
;
Chen, Yiran
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)
INOR-An Intelligent noise reduction method to defend against adversarial audio examples
期刊论文
NEUROCOMPUTING, 2020, 卷号: 401, 页码: 160-172
作者:
Guo, Qingli
;
Ye, Jing
;
Chen, Yiran
;
Hu, Yu
;
Lan, Yazhu
;
Zhang, Guohe
;
Li, Xiaowei
收藏
  |  
浏览/下载:50/0
  |  
提交时间:2020/12/10
Adversarial audio examples
Defense against adversarial audio examples
INOR
MultiPAD: A Multivariant Partition-Based Method for Audio Adversarial Examples Detection
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 63368-63380
作者:
Guo, Qingli
;
Ye, Jing
;
Hu, Yu
;
Zhang, Guohe
;
Li, Xiaowei
;
Li, Huawei
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2020/12/10
Speech recognition
Feature extraction
Decoding
Mathematical model
Acoustics
Psychoacoustic models
Radio frequency
Adversarial examples
audio
detection
multivariant partition