×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [6]
计算技术研究所 [2]
湖南大学 [1]
内容类型
期刊论文 [8]
会议论文 [1]
发表日期
2022 [2]
2021 [3]
2020 [3]
2019 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Towards Human-Machine Recognition Alignment: An Adversarilly Robust Multimodal Retrieval Hashing Framework
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 13
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Liu, Bin
;
Wang, Xiao
;
Mao, Wenji
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/11/14
Training
Task analysis
Semantics
Perturbation methods
Feature extraction
Computational modeling
Robustness
Adversarial perturbation
adversarially robust training
deep hashing
multimodal retrieval
Perturbation Inactivation Based Adversarial Defense for Face Recognition
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:
Ren, Min
;
Zhu, Yuhao
;
Wang, Yunlong
;
Sun, Zhenan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/11/14
Face recognition
Perturbation methods
Robustness
Immune system
Principal component analysis
Deep learning
Training
Adversarial machine learning
deep learning
graph neural network
face recognition
Adversarial Analysis for Source Camera Identification
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 11, 页码: 4174-4186
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Dai, Xiaorui
;
Li, Yi
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2021/12/28
Cameras
Feature extraction
Forensics
Task analysis
Perturbation methods
Neural networks
Training
Adversarial attacks
fingerprint copy-move attack
joint feature-based auto-learning attack
relation mismatch
Adversarial Perturbation Defense on Deep Neural Networks
期刊论文
ACM COMPUTING SURVEYS, 2021, 卷号: 54, 期号: 8, 页码: 36
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Mao, Wenji
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2021/12/28
Adversarial perturbation defense
deep neural networks
security
origin
Are You Confident That You Have Successfully Generated Adversarial Examples?
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Wei, Fei
;
Qin, Zhan
收藏
  |  
浏览/下载:69/0
  |  
提交时间:2021/08/15
Perturbation methods
Iterative methods
Computational modeling
Neural networks
Security
Training
Robustness
Deep neural networks
adversarial examples
structural black box
buffer
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)
Efficient Joint Gradient Based Atack Against SOR Defense for 3D Point Cloud Classification
会议论文
Virtual, October 12–16, 2020
作者:
Chengcheng Ma
;
Weiliang Meng
;
Baoyuan Wu
;
Shibiao Xu
;
Xiaopeng Zhang
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/04/02
INOR-An Intelligent noise reduction method to defend against adversarial audio examples
期刊论文
NEUROCOMPUTING, 2020, 卷号: 401, 页码: 160-172
作者:
Guo, Qingli
;
Ye, Jing
;
Chen, Yiran
;
Hu, Yu
;
Lan, Yazhu
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/12/10
Adversarial audio examples
Defense against adversarial audio examples
INOR
Markov Chain Based Efficient Defense Against Adversarial Examples in Computer Vision
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 5695-5706
作者:
Yue Zhou
;
Xiaofang Hu
;
Lidan Wang
;
Shukai Duan
;
Yiran Chen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/13
Markov
processes
Machine
learning
Computer
vision
Perturbation
methods
Security
Image
recognition
Probability
Machine
learning
adversarial
examples
defense
method
Markov
chain
©版权所有 ©2017 CSpace - Powered by
CSpace