×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [10]
华南理工大学 [2]
数学与系统科学研究院 [1]
内容类型
期刊论文 [11]
会议 [1]
会议论文 [1]
发表日期
2023 [3]
2022 [5]
2021 [2]
2020 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Adversarial Heterogeneous Graph Neural Network for Robust Recommendation
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 页码: 12
作者:
Sang, Lei
;
Xu, Min
;
Qian, Shengsheng
;
Wu, Xindong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2023/11/22
Perturbation methods
Motion pictures
Training
Graph neural networks
Robustness
Semantics
Predictive models
Adversarial training (AT)
graph neural network (GNN)
heterogeneous graph
recommendation
Robust Monitor for Industrial IoT Condition Prediction
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2023, 卷号: 10, 期号: 10, 页码: 8618-8629
作者:
Zhang, Xingwei
;
Tian, Hu
;
Zheng, Xiaolong
;
Zeng, Daniel Dajun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/11/17
Perturbation methods
Monitoring
Industrial Internet of Things
Training
Predictive models
Robustness
Temperature sensors
Adversarial perturbation
adversarial training
Industrial Internet of Things (IIoT)
machine learning (ML)
temporal convolutional network (TCN)
Adversarial training with distribution normalization and margin balance
期刊论文
PATTERN RECOGNITION, 2023, 卷号: 136, 页码: 11
作者:
Cheng, Zhen
;
Zhu, Fei
;
Zhang, Xu-Yao
;
Liu, Cheng-Lin
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2023/01/09
Adversarial robustness
Adversarial training
Distribution normalization
Margin balance
ASCL: Adversarial supervised contrastive learning for defense against word substitution attacks
期刊论文
NEUROCOMPUTING, 2022, 卷号: 510, 页码: 59-68
作者:
Shi, Jiahui
;
Li, Linjing
;
Zeng, Daniel
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/11/14
Adversarial example
Adversarial training
Model robustness
Contrastive learning
Natural language processing
Towards Human-Machine Recognition Alignment: An Adversarilly Robust Multimodal Retrieval Hashing Framework
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 13
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Liu, Bin
;
Wang, Xiao
;
Mao, Wenji
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/11/14
Training
Task analysis
Semantics
Perturbation methods
Feature extraction
Computational modeling
Robustness
Adversarial perturbation
adversarially robust training
deep hashing
multimodal retrieval
Adversarial Information Bottleneck
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 页码: 10
作者:
Zhai, Penglong
;
Zhang, Shihua
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2023/02/07
Robustness
Optimization
Mutual information
Deep learning
Perturbation methods
Training
Task analysis
Adversarial robustness
deep learning
hyperparameter selection
information bottleneck (IB)
Denoised Internal Models: A Brain-inspired Autoencoder Against Adversarial Attacks
期刊论文
Machine Intelligence Research, 2022, 卷号: 19, 期号: 5, 页码: 456-471
作者:
Kai-Yuan Liu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/09/30
Brain-inspired learning
autoencoder
robustness
adversarial attack
generative model
Perturbation Inactivation Based Adversarial Defense for Face Recognition
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:
Ren, Min
;
Zhu, Yuhao
;
Wang, Yunlong
;
Sun, Zhenan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/11/14
Face recognition
Perturbation methods
Robustness
Immune system
Principal component analysis
Deep learning
Training
Adversarial machine learning
deep learning
graph neural network
face recognition
Robust Cross-lingual Task-oriented Dialogue
期刊论文
ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING, 2021, 卷号: 20, 期号: 6, 页码: 24
作者:
Xiang, Lu
;
Zhu, Junnan
;
Zhao, Yang
;
Zhou, Yu
;
Zong, Chengqing
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2021/12/28
Cross-lingual
dialogue system
adversarial learning
knowledge
robustness
Are You Confident That You Have Successfully Generated Adversarial Examples?
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Wei, Fei
;
Qin, Zhan
收藏
  |  
浏览/下载:69/0
  |  
提交时间:2021/08/15
Perturbation methods
Iterative methods
Computational modeling
Neural networks
Security
Training
Robustness
Deep neural networks
adversarial examples
structural black box
buffer
©版权所有 ©2017 CSpace - Powered by
CSpace