CASIA OpenIR

浏览/检索结果: 共4条,第1-4条 帮助

限定条件                        
已选(0)清除 条数/页:   排序方式:
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:354/63  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
Perturbation Inactivation Based Adversarial Defense for Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:  Ren, Min;  Zhu, Yuhao;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5658Kb)  |  收藏  |  浏览/下载:282/55  |  提交时间:2022/11/14
Face recognition  Perturbation methods  Robustness  Immune system  Principal component analysis  Deep learning  Training  Adversarial machine learning  deep learning  graph neural network  face recognition  
Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2022, 卷号: 16, 期号: 3, 页码: 11
作者:  Fan, Junsong;  Wang, Yuxi;  Guan, He;  Song, Chunfeng;  Zhang, Zhaoxiang
Adobe PDF(4804Kb)  |  收藏  |  浏览/下载:315/54  |  提交时间:2022/06/10
domain adaptation  semantic segmentation  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:367/45  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer