中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
自动化研究所 [5]
计算技术研究所 [4]
采集方式
OAI收割 [9]
内容类型
期刊论文 [8]
会议论文 [1]
发表日期
2023 [1]
2022 [3]
2021 [2]
2020 [3]
学科主题
筛选
浏览/检索结果:
共9条,第1-9条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
Characterizing and Understanding Defense Methods for GNNs on GPUs
期刊论文
OAI收割
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:
Wu, Meng
;
Yan, Mingyu
;
Yang, Xiaocheng
;
Li, Wenming
;
Zhang, Zhimin
  |  
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/12/04
Kernel
Purification
Estimation
Graphics processing units
Perturbation methods
Electric breakdown
Training
Graph neural networks
defense
execution semantic
execution pattern
overhead
Towards Human-Machine Recognition Alignment: An Adversarilly Robust Multimodal Retrieval Hashing Framework
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 13
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Liu, Bin
;
Wang, Xiao
;
Mao, Wenji
  |  
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2022/11/14
Training
Task analysis
Semantics
Perturbation methods
Feature extraction
Computational modeling
Robustness
Adversarial perturbation
adversarially robust training
deep hashing
multimodal retrieval
Perturbation Inactivation Based Adversarial Defense for Face Recognition
期刊论文
OAI收割
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:
Ren, Min
;
Zhu, Yuhao
;
Wang, Yunlong
;
Sun, Zhenan
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2022/11/14
Face recognition
Perturbation methods
Robustness
Immune system
Principal component analysis
Deep learning
Training
Adversarial machine learning
deep learning
graph neural network
face recognition
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
期刊论文
OAI收割
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:
Zhu, Yao
;
Chen, Yuefeng
;
Li, Xiaodan
;
Chen, Kejiang
;
He, Yuan
  |  
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/07/12
Data models
Perturbation methods
Iterative methods
Training
Distributed databases
Predictive models
Neural networks
Adversarial transferability
adversarial attack
black-box attack
Adversarial Perturbation Defense on Deep Neural Networks
期刊论文
OAI收割
ACM COMPUTING SURVEYS, 2021, 卷号: 54, 期号: 8, 页码: 36
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Mao, Wenji
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2021/12/28
Adversarial perturbation defense
deep neural networks
security
origin
Are You Confident That You Have Successfully Generated Adversarial Examples?
期刊论文
OAI收割
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Wei, Fei
;
Qin, Zhan
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2021/08/15
Perturbation methods
Iterative methods
Computational modeling
Neural networks
Security
Training
Robustness
Deep neural networks
adversarial examples
structural black box
buffer
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
  |  
收藏
  |  
浏览/下载:60/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)
Efficient Joint Gradient Based Atack Against SOR Defense for 3D Point Cloud Classification
会议论文
OAI收割
Virtual, October 12–16, 2020
作者:
Chengcheng Ma
;
Weiliang Meng
;
Baoyuan Wu
;
Shibiao Xu
;
Xiaopeng Zhang
  |  
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2022/04/02
INOR-An Intelligent noise reduction method to defend against adversarial audio examples
期刊论文
OAI收割
NEUROCOMPUTING, 2020, 卷号: 401, 页码: 160-172
作者:
Guo, Qingli
;
Ye, Jing
;
Chen, Yiran
;
Hu, Yu
;
Lan, Yazhu
  |  
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/12/10
Adversarial audio examples
Defense against adversarial audio examples
INOR