KMS

浏览/检索结果: 共5条,第1-5条 帮助

已选(0)清除 条数/页:   排序方式:
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 5
作者:  Lei Bu;  Zhe Zhao;  Yuchao Duan;  Fu Song
Adobe PDF(2478Kb)  |  收藏  |  浏览/下载:464/73  |  提交时间:2022/09/19
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: PP, 期号: 99
作者:  Guangke Chen;  Zhe Zhao;  Fu Song;  Sen Chen;  Lingling Fan
Adobe PDF(2587Kb)  |  收藏  |  浏览/下载:471/98  |  提交时间:2022/07/21
GREYHOUND: Directed Greybox Wi-Fi Fuzzing 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 2, 页码: 1
作者:  Matheus E. Garbelini;  Chundong Wang;  Sudipta Chattopadhyay
Adobe PDF(2553Kb)  |  收藏  |  浏览/下载:388/9  |  提交时间:2020/09/01
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 20, 期号: 5, 页码: 3970-3987
作者:  Chen, Guangke;  Zhao, Zhe;  Song, Fu;  Chen, Sen;  Fan, Lingling
Adobe PDF(2232Kb)  |  收藏  |  浏览/下载:550/169  |  提交时间:2022/11/09
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 20, 期号: 4, 页码: 2882-2895
作者:  Xin Chen;  Liang Feng Zhang;  Jing Liu
Adobe PDF(1318Kb)  |  收藏  |  浏览/下载:266/1  |  提交时间:2022/11/07
  • 首页
  • 上一页
  • 1
  • 下一页
  • 末页