CASIA OpenIR

浏览/检索结果: 共7条,第1-7条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
作者:  Zhang, Xingwei;  Zheng, Xiaolong;  Mao, Wenji;  Zeng, Daniel Dajun;  Wang, Fei-Yue
收藏  |  浏览/下载:252/0  |  提交时间:2022/11/14
Perturbation methods  Semantics  Computational modeling  Codes  Task analysis  Privacy  Software  Adversarial perturbation  deep neural network (DNN)  privacy protection  semantic retrieval  
Towards Human-Machine Recognition Alignment: An Adversarilly Robust Multimodal Retrieval Hashing Framework 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 13
作者:  Zhang, Xingwei;  Zheng, Xiaolong;  Liu, Bin;  Wang, Xiao;  Mao, Wenji;  Zeng, Daniel Dajun;  Wang, Fei-Yue
收藏  |  浏览/下载:209/0  |  提交时间:2022/11/14
Training  Task analysis  Semantics  Perturbation methods  Feature extraction  Computational modeling  Robustness  Adversarial perturbation  adversarially robust training  deep hashing  multimodal retrieval  
Hierarchical Multihop Reasoning on Knowledge Graphs 期刊论文
IEEE INTELLIGENT SYSTEMS, 2022, 卷号: 37, 期号: 1, 页码: 71-78
作者:  Wang, Zikang;  Li, Linjing;  Zeng, Daniel Dajun
Adobe PDF(1656Kb)  |  收藏  |  浏览/下载:326/81  |  提交时间:2022/07/25
Reconstruction of the Transmission Chain of COVID-19 Outbreak in Beijing's Xinfadi Market, China 期刊论文
International Journal of Infectious Diseases, 2022, 卷号: 116, 页码: 411-417
作者:  Luo, Tianyi;  Wang, Jiaojiao;  Wang, Quanyi;  Wang, Xiaoli;  Zhao, Pengfei;  Zeng, Daniel Dajun;  Zhang, Qingpeng;  Cao, Zhidong
Adobe PDF(1640Kb)  |  收藏  |  浏览/下载:184/31  |  提交时间:2022/07/12
transmission chain  data augmentation  reconstruction  COVID-19  
Knowledge structure driven prototype learning and verification for fact checking 期刊论文
KNOWLEDGE-BASED SYSTEMS, 2022, 卷号: 238, 页码: 10
作者:  Wang, Shuai;  Mao, Wenji;  Wei, Penghui;  Zeng, Daniel D.
Adobe PDF(965Kb)  |  收藏  |  浏览/下载:439/76  |  提交时间:2022/06/10
Fact checking  Knowledge structure  Hierarchical prototype learning  Relation enhancement  Verification  
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 2, 页码: 717-730
作者:  Liang, Yunji;  Wang, Qiushi;  Xiong, Kang;  Zheng, Xiaolong;  Yu, Zhiwen;  Zeng, Daniel
收藏  |  浏览/下载:198/0  |  提交时间:2022/06/06
paced learning  temporal convolutional network  factorization machine  wide & deep  malicious URL detection  
Cyber-Resilient Multi-Energy Management for Complex Systems 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 卷号: 18, 期号: 3, 页码: 2144-2159
作者:  Zhao, Pengfei;  Cao, Zhidong;  Zeng, Dajun;  Gu, Chenghong;  Wang, Zhaoyu;  Xiang, Yue;  Qadrdan, Meysam;  Chen, Xinlei;  Yan, Xiaohe;  Li, Shuangqi
收藏  |  浏览/下载:249/0  |  提交时间:2022/01/27
Indexes  Cogeneration  Uncertainty  Reactive power  Pipelines  Optimization  Natural gas  Cyberattacks  distribution systems  energy hubs  load redistribution (LR) attacks  multienergy systems  real-time operation  resilience enhancement