CASIA OpenIR

浏览/检索结果: 共4条,第1-4条 帮助

限定条件                        
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:46/15  |  提交时间:2024/06/21
Semi-supervised Temporal Action Proposal Generation via Exploiting 2-d Proposal Map 期刊论文
IEEE Transactions on Multimedia, 2021, 页码: 3624 - 3635
作者:  Wang, Weining;  Lin, Tianwei;  He, Dongliang;  Li, Fu;  Wen, Shilei;  Wang, Liang;  Liu, Jing
Adobe PDF(4851Kb)  |  收藏  |  浏览/下载:163/26  |  提交时间:2023/05/03
Semi-supervised learning  proposal map oriented mean-teacher  pseudo label  
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:164/43  |  提交时间:2023/04/26
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:378/47  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer