KMS

浏览/检索结果: 共6条,第1-6条 帮助

已选(0)清除 条数/页:   排序方式:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples 期刊论文
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 卷号: 33, 期号: 3
作者:  Zhao, Zhe;  Chen, Guangke;  Liu, Tong;  Li, Taishan;  Song, Fu
Adobe PDF(1098Kb)  |  收藏  |  浏览/下载:475/0  |  提交时间:2023/11/22
Demo: Certified Robustness on Toolformer 会议论文
ASSOCIATION FOR COMPUTING MACHINERY, Copenhagen, Denmark, November 26, 2023 - November 30, 2023
作者:  Xu, Yue;  Wang, Wenjie
Adobe PDF(746Kb)  |  收藏  |  浏览/下载:361/1  |  提交时间:2023/11/21
Defending against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit-plane Slicing 期刊论文
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 卷号: 18, 期号: 3
作者:  Liu, Yuan;  Dong, Jinxin;  Zhou, Pingqiang
Adobe PDF(3044Kb)  |  收藏  |  浏览/下载:231/1  |  提交时间:2022/09/16
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 20, 期号: 5, 页码: 3970-3987
作者:  Chen, Guangke;  Zhao, Zhe;  Song, Fu;  Chen, Sen
Adobe PDF(2232Kb)  |  收藏  |  浏览/下载:546/166  |  提交时间:2022/11/09
Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks 会议论文
2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), null,Wuhan,PEOPLES R CHINA, OCT 25-28, 2021
作者:  Guo, Xingwu;  Wan, Wenjie;  Zhang, Zhaodi;  Zhang, Min;  Song, Fu
Adobe PDF(972Kb)  |  收藏  |  浏览/下载:216/0  |  提交时间:2022/05/27
MagNet: a Two-Pronged Defense against Adversarial Examples 会议论文
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY
作者:  Meng, Dongyu;  Chen, Hao
Adobe PDF(1573Kb)  |  收藏  |  浏览/下载:537/0  |  提交时间:2018/09/09
  • 首页
  • 上一页
  • 1
  • 下一页
  • 末页