中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
自动化研究所 [5]
计算技术研究所 [4]
软件研究所 [3]
采集方式
OAI收割 [12]
内容类型
期刊论文 [12]
发表日期
2023 [2]
2022 [3]
2021 [2]
2020 [2]
2012 [2]
2009 [1]
更多
学科主题
Computer S... [1]
Computer S... [1]
筛选
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
内容类型:期刊论文
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models
期刊论文
OAI收割
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:
Wu, Chen
;
Zhang, Ruqing
;
Guo, Jiafeng
;
De Rijke, Maarten
;
Fan, Yixing
  |  
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Adversarial attack
decision-based black-box attack setting
neural ranking models
Adversarial training with distribution normalization and margin balance
期刊论文
OAI收割
PATTERN RECOGNITION, 2023, 卷号: 136, 页码: 11
作者:
Cheng, Zhen
;
Zhu, Fei
;
Zhang, Xu-Yao
;
Liu, Cheng-Lin
  |  
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2023/01/09
Adversarial robustness
Adversarial training
Distribution normalization
Margin balance
Attention-guided transformation-invariant attack for black-box adversarial examples
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:
Zhu, Jiaqi
;
Dai, Feng
;
Yu, Lingyun
;
Xie, Hongtao
;
Wang, Lidong
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/12/07
adversarial examples
attention
media convergence
security
transformation-invariant
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
期刊论文
OAI收割
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:
Zhu, Yao
;
Chen, Yuefeng
;
Li, Xiaodan
;
Chen, Kejiang
;
He, Yuan
  |  
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/07/12
Data models
Perturbation methods
Iterative methods
Training
Distributed databases
Predictive models
Neural networks
Adversarial transferability
adversarial attack
black-box attack
Revisiting ensemble adversarial attack
期刊论文
OAI收割
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:
Ziwen He
;
Wei Wang
;
Jing Dong
;
Tieniu Tan
  |  
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2023/04/26
Are You Confident That You Have Successfully Generated Adversarial Examples?
期刊论文
OAI收割
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Wei, Fei
;
Qin, Zhan
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2021/08/15
Perturbation methods
Iterative methods
Computational modeling
Neural networks
Security
Training
Robustness
Deep neural networks
adversarial examples
structural black box
buffer
Universal adversarial perturbations against object detection
期刊论文
OAI收割
PATTERN RECOGNITION, 2021, 卷号: 110, 页码: 12
作者:
Li, Debang
;
Zhang, Junge
;
Huang, Kaiqi
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2021/01/06
Adversarial examples
Object detection
Universal adversarial perturbation
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
  |  
收藏
  |  
浏览/下载:60/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)
Adversarial attacks on Faster R-CNN object detector
期刊论文
OAI收割
NEUROCOMPUTING, 2020, 卷号: 382, 页码: 87-95
作者:
Wang, Yutong
;
Wang, Kunfeng
;
Zhu, Zhanxing
;
Wang, Fei-Yue
  |  
收藏
  |  
浏览/下载:48/0
  |  
提交时间:2020/03/30
Adversarial attack
Object detection
White-box attack
Black-box attack
polar differential power attacks and evaluation
期刊论文
OAI收割
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 7, 页码: 1588-1604
Tang Ming
;
Qiu ZhenLong
;
Gao Si
;
Yi Mu
;
Liu ShuBo
;
Zhang HuanGuo
;
Jin YingZhen
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2013/09/17
computer security
differential power attack
side channel attack