中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
计算技术研究所 [4]
采集方式
OAI收割 [4]
内容类型
期刊论文 [4]
发表日期
2023 [1]
2022 [2]
2020 [1]
学科主题
筛选
浏览/检索结果:
共4条,第1-4条
帮助
限定条件
专题:计算技术研究所
第一署名单位
第一作者单位
通讯作者单位
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
PRADA: Practical Black-box Adversarial Attacks against Neural Ranking Models
期刊论文
OAI收割
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2023, 卷号: 41, 期号: 4, 页码: 27
作者:
Wu, Chen
;
Zhang, Ruqing
;
Guo, Jiafeng
;
De Rijke, Maarten
;
Fan, Yixing
  |  
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Adversarial attack
decision-based black-box attack setting
neural ranking models
Attention-guided transformation-invariant attack for black-box adversarial examples
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:
Zhu, Jiaqi
;
Dai, Feng
;
Yu, Lingyun
;
Xie, Hongtao
;
Wang, Lidong
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/12/07
adversarial examples
attention
media convergence
security
transformation-invariant
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
期刊论文
OAI收割
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:
Zhu, Yao
;
Chen, Yuefeng
;
Li, Xiaodan
;
Chen, Kejiang
;
He, Yuan
  |  
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/07/12
Data models
Perturbation methods
Iterative methods
Training
Distributed databases
Predictive models
Neural networks
Adversarial transferability
adversarial attack
black-box attack
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
  |  
收藏
  |  
浏览/下载:60/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)