CASIA OpenIR

浏览/检索结果: 共6条,第1-6条 帮助

已选(0)清除 条数/页:   排序方式:
Adversarial Attacks on Scene Graph Generation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 3210-3225
作者:  Zhao, Mengnan;  Zhang, Lihe;  Wang, Wei;  Kong, Yuqiu;  Yin, Baocai
收藏  |  浏览/下载:9/0  |  提交时间:2024/07/03
Task analysis  Object detection  Windows  Visualization  Mirrors  Predictive models  Perturbation methods  Scene graph generation  adversarial attack  bounding box relabeling  two-step weighted attack  
Denoised Internal Models: A Brain-inspired Autoencoder Against Adversarial Attacks 期刊论文
Machine Intelligence Research, 2022, 卷号: 19, 期号: 5, 页码: 456-471
作者:  Kai-Yuan Liu;  Xing-Yu Li;  Yu-Rui Lai;  Hang Su;  Jia-Chen Wang;  Chun-Xu Guo;  Hong Xie;  Ji-Song Guan;  Yi Zhou
Adobe PDF(3203Kb)  |  收藏  |  浏览/下载:58/11  |  提交时间:2024/04/23
Brain-inspired learning  autoencoder  robustness  adversarial attack  generative model  
Towards a unified framework for imperceptible textual attacks 期刊论文
APPLIED INTELLIGENCE, 2024, 页码: 14
作者:  Shi, Jiahui;  Li, Linjing;  Zeng, Daniel
收藏  |  浏览/下载:89/0  |  提交时间:2024/03/26
Adversarial attack  Backdoor attack  Natural language processing  Adversarial machine learning  
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:382/70  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
Binary thresholding defense against adversarial attacks 期刊论文
Neurocomputing, 2021, 卷号: 445, 期号: 445, 页码: 61-71
作者:  Yutong Wang;  Wenwen Zhang;  Tianyu Shen;  Hui Yu;  Fei-Yue Wang
Adobe PDF(1771Kb)  |  收藏  |  浏览/下载:224/64  |  提交时间:2021/06/15
Binary thresholding  Defense  Adversarial training  Adversarial attack  
Adversarial attacks on Faster R-CNN object detector 期刊论文
NEUROCOMPUTING, 2020, 卷号: 382, 期号: 无, 页码: 87-95
作者:  Wang, Yutong;  Wang, Kunfeng;  Zhu, Zhanxing;  Wang, Fei-Yue
Adobe PDF(5655Kb)  |  收藏  |  浏览/下载:328/71  |  提交时间:2020/03/30
Adversarial attack  Object detection  White-box attack  Black-box attack