CASIA OpenIR

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:45/15  |  提交时间:2024/06/21
Semi-supervised Temporal Action Proposal Generation via Exploiting 2-d Proposal Map 期刊论文
IEEE Transactions on Multimedia, 2021, 页码: 3624 - 3635
作者:  Wang, Weining;  Lin, Tianwei;  He, Dongliang;  Li, Fu;  Wen, Shilei;  Wang, Liang;  Liu, Jing
Adobe PDF(4851Kb)  |  收藏  |  浏览/下载:163/26  |  提交时间:2023/05/03
Semi-supervised learning  proposal map oriented mean-teacher  pseudo label  
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:164/43  |  提交时间:2023/04/26
An Empirical Study of Graph Contrastive Learning 会议论文
, Online, 2021-12
作者:  Zhu, Yanqiao;  Xu, Yichen;  Liu, Qiang;  Wu, Shu
Adobe PDF(475Kb)  |  收藏  |  浏览/下载:261/71  |  提交时间:2022/06/13
Graph Contrastive Learning with Adaptive Augmentation 会议论文
, Online, 2021-4
作者:  Zhu, Yanqiao;  Xu, Yichen;  Yu, Feng;  Liu, Qiang;  Wu, Shu;  Wang, Liang
Adobe PDF(2989Kb)  |  收藏  |  浏览/下载:186/15  |  提交时间:2022/06/13
Mining Cross Features for Financial Credit Risk Assessment 会议论文
, Queensland, Australia, 2021.11.01-2021.11.05
作者:  Liu, Qiang;  Liu, Zhaocheng;  Zhang, Haoli;  Chen, Yuntian;  Zhu, Jun
Adobe PDF(6112Kb)  |  收藏  |  浏览/下载:251/82  |  提交时间:2022/04/07
Deep Active Learning for Text Classification with Diverse Interpretations 会议论文
, Queensland, Australia, 2021.11.01-2021.11.05
作者:  Liu, Qiang;  Zhu, Yanqiao;  liu, Zhaocheng;  Zhang, Yufeng;  Wu, Shu
Adobe PDF(1506Kb)  |  收藏  |  浏览/下载:238/64  |  提交时间:2022/04/07
Mining Latent Structures for Multimedia Recommendation 会议论文
, Chengdu, China, 2021.10.20-2021.10.24
作者:  Zhang, Jinghao;  Zhu, Yanqiao;  Liu, Qiang;  Wu, Shu;  Wang, Shuhui;  Wang, Liang
Adobe PDF(3070Kb)  |  收藏  |  浏览/下载:207/55  |  提交时间:2022/04/07
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:378/47  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer