中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [61]
计算技术研究所 [30]
自动化研究所 [25]
中国科学院大学 [13]
地理科学与资源研究... [12]
力学研究所 [10]
更多
采集方式
OAI收割 [197]
iSwitch采集 [13]
内容类型
期刊论文 [177]
会议论文 [32]
SCI/SSCI论文 [1]
发表日期
2024 [9]
2023 [15]
2022 [21]
2021 [19]
2020 [8]
2019 [7]
更多
学科主题
Computer ... [11]
Computer S... [3]
Informatio... [3]
Computer S... [2]
Telecommun... [2]
Computer S... [1]
更多
筛选
浏览/检索结果:
共210条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Securing the internet's backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense
期刊论文
OAI收割
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:
Fu, Yufan
;
Lee, Xiaodong
;
Wei, Jiuqi
;
Li, Ying
;
Peng, Botao
  |  
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2024/12/06
DNS
Cache poisoning attack
Blockchain
Smart contract
Incentive mechanism
Adaptive Perturbation for Adversarial Attack
期刊论文
OAI收割
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:
Yuan, Zheng
;
Zhang, Jie
;
Jiang, Zhaoyan
  |  
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/12/06
Perturbation methods
Iterative methods
Adaptation models
Generators
Closed box
Security
Training
Adversarial attack
transfer-based attack
adversarial example
adaptive perturbation
Towards Robust Semantic Segmentation against Patch-Based Attack via Attention Refinement
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024, 页码: 23
作者:
Yuan, Zheng
;
Zhang, Jie
;
Wang, Yude
;
Shan, Shiguang
;
Chen, Xilin
  |  
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2024/12/06
Model robustness
Attention mechanism
Semantic segmentation
Patch-based attack
Graph Adversarial Immunization for Certifiable Robustness
期刊论文
OAI收割
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 卷号: 36, 期号: 4, 页码: 1597-1610
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2024/05/20
Adversarial attack
adversarial immunization
certifiable robustness
graph neural networks
node classification
Towards a unified framework for imperceptible textual attacks
期刊论文
OAI收割
APPLIED INTELLIGENCE, 2024, 页码: 14
作者:
Shi, Jiahui
;
Li, Linjing
;
Zeng, Daniel
  |  
收藏
  |  
浏览/下载:60/0
  |  
提交时间:2024/03/26
Adversarial attack
Backdoor attack
Natural language processing
Adversarial machine learning
GCSA: A New Adversarial Example-Generating Scheme Toward Black-Box Adversarial Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 卷号: 70, 期号: 1, 页码: 2038-2048
作者:
Fan, Xinxin
;
Li, Mengfan
;
Zhou, Jia
;
Jing, Quanliang
;
Lin, Chi
  |  
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/12/06
Closed box
Perturbation methods
Predictive models
Indexes
Training
Glass box
Optimization
Deep learning
adversarial examples
black-box adversarial attack
transferability
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time
Adversarial Attacks on Scene Graph Generation
期刊论文
OAI收割
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 3210-3225
作者:
Zhao, Mengnan
;
Zhang, Lihe
;
Wang, Wei
;
Kong, Yuqiu
;
Yin, Baocai
  |  
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2024/07/03
Task analysis
Object detection
Windows
Visualization
Mirrors
Predictive models
Perturbation methods
Scene graph generation
adversarial attack
bounding box relabeling
two-step weighted attack
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:
Liu, Zizhen
;
He, Weiyang
;
Chang, Chip-Hong
;
Ye, Jing
;
Li, Huawei
  |  
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2024/12/06
Data models
Servers
Training
Hidden Markov models
Training data
Adaptation models
Security
Federated learning
poisoning attack
knowledge distillation
attention maps
deep neural network
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:
Tang, Bowen
;
Wu, Chenggang
;
Yew, Pen-Chung
;
Zhang, Yinqian
;
Xie, Mengyao
  |  
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2024/05/20
Resource contention
scheduling strategy
simultaneous multithreading (SMT)
transient execution attack (TEA)