CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共5条,第1-5条 帮助

限定条件                            
已选(0)清除 条数/页:   排序方式:
Invisible Intruders: Label-Consistent Backdoor Attack using Re-parameterized Noise Trigger 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 卷号: 14, 期号: 8, 页码: 1-13
作者:  Bo Wang;  Fei Yu;  Fei Wei;  Yi Li;  Wei Wang
Adobe PDF(1364Kb)  |  收藏  |  浏览/下载:39/13  |  提交时间:2024/06/21
Revisiting ensemble adversarial attack 期刊论文
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:  Ziwen He;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(1597Kb)  |  收藏  |  浏览/下载:209/73  |  提交时间:2023/04/26
Adversarial analysis for source camera identification 期刊论文
IEEE Transactions on Circuits and Systems for Video Technology, 2021, 卷号: 31, 期号: 11, 页码: 4174 - 4186
作者:  Bo Wang;  Mengnan Zhao;  Wei Wang;  Xiaorui Dai;  Yi Li;  Yanqing Guo
Adobe PDF(6167Kb)  |  收藏  |  浏览/下载:160/42  |  提交时间:2023/04/26
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:360/65  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:371/46  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer