×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [20]
沈阳自动化研究所 [5]
清华大学 [4]
北京大学 [4]
西安交通大学 [3]
兰州理工大学 [2]
更多...
内容类型
期刊论文 [42]
会议论文 [7]
专利 [1]
会议 [1]
其他 [1]
发表日期
2024 [1]
2023 [3]
2022 [3]
2021 [9]
2020 [6]
2019 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共52条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Adversarial Attacks on Scene Graph Generation
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 3210-3225
作者:
Zhao, Mengnan
;
Zhang, Lihe
;
Wang, Wei
;
Kong, Yuqiu
;
Yin, Baocai
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/07/03
Task analysis
Object detection
Windows
Visualization
Mirrors
Predictive models
Perturbation methods
Scene graph generation
adversarial attack
bounding box relabeling
two-step weighted attack
Towards Better Word Importance Ranking in Textual Adversarial Attacks
会议论文
Gold Coast, Australia, June 18-23, 2023
作者:
Shi, Jiahui
;
Li, Linjing
;
Zeng, Daniel Dajun
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2023/09/27
Adversarial training with distribution normalization and margin balance
期刊论文
PATTERN RECOGNITION, 2023, 卷号: 136, 页码: 11
作者:
Cheng, Zhen
;
Zhu, Fei
;
Zhang, Xu-Yao
;
Liu, Cheng-Lin
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2023/01/09
Adversarial robustness
Adversarial training
Distribution normalization
Margin balance
Exploratory Adversarial Attacks on Graph Neural Networks for Semi-Supervised Node Classification
期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 12
作者:
Lin, Xixun
;
Zhou, Chuan
;
Wu, Jia
;
Yang, Hong
;
Wang, Haibo
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2023/02/07
Gradient -based attacks
Maximal gradient
Graph neural networks
Semi-supervised node classification
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2022, 卷号: 9, 期号: 3, 页码: 377-391
作者:
Jun Zhang
;
Lei Pan
;
Qing-Long Han
;
Chao Chen
;
Sheng Wen
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/03/09
Cyber-physical system
cybersecurity
deep learning
intrusion detection
pattern classification
Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models
期刊论文
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022
作者:
Akhtar, Muhammad Shoaib
;
Feng, Tao
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/03/01
cyberattack
machine learning
ensemble learning
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Adversarial Analysis for Source Camera Identification
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 11, 页码: 4174-4186
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Dai, Xiaorui
;
Li, Yi
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2021/12/28
Cameras
Feature extraction
Forensics
Task analysis
Perturbation methods
Neural networks
Training
Adversarial attacks
fingerprint copy-move attack
joint feature-based auto-learning attack
relation mismatch
NAS-FAS: Static-Dynamic Central Difference Network Search for Face Anti-Spoofing
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2021, 卷号: 43, 期号: 9, 页码: 3005-3023
作者:
Yu, Zitong
;
Wan, Jun
;
Qin, Yunxiao
;
Li, Xiaobai
;
Li, Stan Z.
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/11/02
Task analysis
Face recognition
Convolution
Testing
Computer architecture
Protocols
Search problems
Face anti-spoofing
neural architecture search
convolution
pooling
static-dynamic
CASIA-SURF 3DMask
Spatial Distribution Assessment of Terrorist Attack Types Based on I-MLKNN Model
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2021, 卷号: 10, 期号: 8, 页码: 22
作者:
Zhao, Ruifang
;
Xie, Xiaolan
;
Zhang, Xun
;
Jin, Min
;
Hao, Mengmeng
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2021/11/05
assessment
terrorist attack types
I-MLKNN
multi-source factors
©版权所有 ©2017 CSpace - Powered by
CSpace