×
验证码:
换一张
忘记密码?
记住我
×
统一认证登录
登录
中文版
|
English
上海科技大学知识管理系统
ShanghaiTech University Knowledge Management System
统一认证登录
登录
注册
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
DOI
出处
存缴日期
收录类别
出版者
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
知识整合
学习讨论厅
在结果中检索
研究单元&专题
信息科学与技术学院 [6]
作者
宋富 [2]
赵哲 [2]
陈光科 [2]
周平强 [1]
孟东宇 [1]
刘通 [1]
更多...
文献类型
会议论文 [3]
期刊论文 [3]
发表日期
2023 [2]
2022 [2]
2021 [1]
2017 [1]
出处
2021 IEEE ... [1]
ACM JOURNA... [1]
ACM TRANSA... [1]
ASSOCIATIO... [1]
CCS''17: P... [1]
IEEE TRANS... [1]
更多...
语种
英语 [6]
资助项目
AI Project... [1]
CAS Projec... [1]
NSFC gener... [1]
NSFC[62074... [1]
National K... [1]
National N... [1]
更多...
资助机构
收录类别
EI [5]
SCI [3]
CPCI [2]
CPCI-S [2]
SCIE [2]
×
知识图谱
KMS
反馈留言
浏览/检索结果:
共6条,第1-6条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
WOS被引频次升序
WOS被引频次降序
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples
期刊论文
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 卷号: 33, 期号: 3
作者:
Zhao, Zhe
;
Chen, Guangke
;
Liu, Tong
;
Li, Taishan
;
Song, Fu
Adobe PDF(1098Kb)
|
收藏
|
浏览/下载:475/0
|
提交时间:2023/11/22
Deep learning
Image processing
Adversarial example
Attack methods
Backdoored sample
Deep learning
Detection
Detection methods
Mislabeled sample
Neural-networks
Performance
Programming paradigms
Demo: Certified Robustness on Toolformer
会议论文
ASSOCIATION FOR COMPUTING MACHINERY, Copenhagen, Denmark, November 26, 2023 - November 30, 2023
作者:
Xu, Yue
;
Wang, Wenjie
Adobe PDF(746Kb)
|
收藏
|
浏览/下载:361/1
|
提交时间:2023/11/21
current
Adversarial example
API calls
Certified robustness
External tools
Language model
Performance
Prompt engineering
State of the art
Tool-augmented language model
Defending against Adversarial Attacks in Deep Learning with Robust Auxiliary Classifiers Utilizing Bit-plane Slicing
期刊论文
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2022, 卷号: 18, 期号: 3
作者:
Liu, Yuan
;
Dong, Jinxin
;
Zhou, Pingqiang
Adobe PDF(3044Kb)
|
收藏
|
浏览/下载:231/1
|
提交时间:2022/09/16
Network security
Adversarial example
Bit planes
Bit-plane slicing
Black boxes
Clean images
Defense
Neural-networks
Recent researches
Security of neural network
White box
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 20, 期号: 5, 页码: 3970-3987
作者:
Chen, Guangke
;
Zhao, Zhe
;
Song, Fu
;
Chen, Sen
Adobe PDF(2232Kb)
|
收藏
|
浏览/下载:546/166
|
提交时间:2022/11/09
Audio systems
Feature extraction
Image recognition
Job analysis
Network security
Adversarial defense
Adversarial example
Adversarial training
Features extraction
Input transformation
Speaker recognition
Speaker recognition system
Task analysis
White box
Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks
会议论文
2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), null,Wuhan,PEOPLES R CHINA, OCT 25-28, 2021
作者:
Guo, Xingwu
;
Wan, Wenjie
;
Zhang, Zhaodi
;
Zhang, Min
;
Song, Fu
Adobe PDF(972Kb)
|
收藏
|
浏览/下载:216/0
|
提交时间:2022/05/27
Deep neural network
robustness verification
adversarial example
scalability
MagNet: a Two-Pronged Defense against Adversarial Examples
会议论文
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY
作者:
Meng, Dongyu
;
Chen, Hao
Adobe PDF(1573Kb)
|
收藏
|
浏览/下载:537/0
|
提交时间:2018/09/09
adversarial example
neural network
autoencoder
首页
上一页
1
下一页
末页