CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共5条,第1-5条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:46/15  |  提交时间:2024/06/21
DFGC 2021: A deepfake game competition 会议论文
, China, 2021
作者:  Peng, Bo;  Fan, Hongxing;  Wang, Wei;  Dong, Jing;  Li, Yuezun;  Lyu, Siwei;  Li, Qi;  Sun, Zhenan
Adobe PDF(2001Kb)  |  收藏  |  浏览/下载:108/15  |  提交时间:2024/02/23
Exploring adversarial fake images on face manifold 会议论文
, Nashville, TN, USA, 20-25 June 2021
作者:  Li Dongze;  Wang Wei;  Fan Hongxing;  Dong Jing
Adobe PDF(4424Kb)  |  收藏  |  浏览/下载:160/44  |  提交时间:2023/04/26
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:167/43  |  提交时间:2023/04/26
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:379/47  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer