咨询与建议

限定检索结果

文献类型

  • 18 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 13 篇 计算机科学与技术...
    • 3 篇 材料科学与工程(可...
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 测绘科学与技术
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 8 篇 理学
    • 4 篇 生物学
    • 3 篇 数学
    • 1 篇 物理学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 5 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 3 篇 文学
    • 2 篇 外国语言文学
    • 1 篇 新闻传播学

主题

  • 18 篇 adversarial atta...
  • 4 篇 deep learning
  • 3 篇 adversarial defe...
  • 3 篇 adversarial exam...
  • 1 篇 health
  • 1 篇 memory mechanism
  • 1 篇 gan-based advers...
  • 1 篇 aggregated rule
  • 1 篇 adversarial defe...
  • 1 篇 residual learnin...
  • 1 篇 visual transform...
  • 1 篇 research and dev...
  • 1 篇 latent variables
  • 1 篇 anti-noise
  • 1 篇 containers
  • 1 篇 defense method
  • 1 篇 adversarial dete...
  • 1 篇 fld
  • 1 篇 adversarial mach...
  • 1 篇 feature fusion

机构

  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 ai security grou...
  • 1 篇 school of comput...
  • 1 篇 department of el...
  • 1 篇 cloudemy technol...
  • 1 篇 institute of art...
  • 1 篇 othman yeop abdu...
  • 1 篇 department of co...
  • 1 篇 information tech...
  • 1 篇 institute of adv...
  • 1 篇 department of co...
  • 1 篇 cyberspace insti...
  • 1 篇 school of cybers...
  • 1 篇 department of in...
  • 1 篇 school of intern...
  • 1 篇 institute of med...
  • 1 篇 computer science...
  • 1 篇 school of cyber ...

作者

  • 2 篇 muhammad shahid ...
  • 2 篇 kazim ali
  • 2 篇 abid sohail
  • 1 篇 ning xu
  • 1 篇 hechen yang
  • 1 篇 muhammad shahzad...
  • 1 篇 lalit kumar awas...
  • 1 篇 marcin grzegorze...
  • 1 篇 ao chen
  • 1 篇 jamal hussain sh...
  • 1 篇 zhaoquan gu
  • 1 篇 adnan n.quershi
  • 1 篇 mueen uddin
  • 1 篇 g.maragatham
  • 1 篇 haoyuan chen
  • 1 篇 yun lin
  • 1 篇 urvashi
  • 1 篇 xiaojiang du
  • 1 篇 shahad alzahrani
  • 1 篇 qingming jonatha...

语言

  • 18 篇 英文
检索条件"主题词=Adversarial attacks"
18 条 记 录,以下是1-10 订阅
排序:
adversarial attacks and defenses for digital communication signals identification
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 756-764页
作者: Qiao Tian Sicheng Zhang Shiwen Mao Yun Lin College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China College of Information and Communication Engineering Harbin Engineering UniversityHarbin150000China Department of Electrical and Computer Engineering Auburn UniversityAuburnAL36849USA
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Towards the universal defense for query-based audio adversarial attacks on speech recognition system
收藏 引用
Cybersecurity 2024年 第1期7卷 53-70页
作者: Feng Guo Zheng Sun Yuxuan Chen Lei Ju School of Cyber Science and Technology Shandong UniversityQingdaoChina Quancheng Laboratory QCLJinanChina
Recently,studies show that deep learning-based automatic speech recognition(ASR)systems are vulnerable to adversarial examples(AEs),which add a small amount of noise to the original audio *** AE attacks pose new chall... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
adversarial Training Against adversarial attacks for Machine Learning-Based Intrusion Detection Systems
收藏 引用
Computers, Materials & Continua 2022年 第11期73卷 3513-3527页
作者: Muhammad Shahzad Haroon Husnain Mansoor Ali Department of Computer Science Shaheed Zulfikar Ali Bhutto Institute of Science and TechnologyKarachi75600Pakistan
Intrusion detection system plays an important role in defending networks from security ***-to-end machine learning-based intrusion detection systems are being used to achieve high detection ***,in case of adversarial ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Chained Dual-Generative adversarial Network:A Generalized Defense Against adversarial attacks
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2541-2555页
作者: Amitoj Bir Singh Lalit Kumar Awasthi Urvashi Mohammad Shorfuzzaman Abdulmajeed Alsufyani Mueen Uddin National Institute of Technology JalandharPB 144001India Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia School of Digital Science University Brunei DarussalamJln Tungku LinkGadongBE1410Brunei Darussalam
Neural networks play a significant role in the field of image *** an input image is modified by adversarial attacks,the changes are imperceptible to the human eye,but it still leads to misclassification of the *** hav... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Deep Image Restoration Model: A Defense Method Against adversarial attacks
收藏 引用
Computers, Materials & Continua 2022年 第5期71卷 2209-2224页
作者: Kazim Ali Adnan N.Quershi Ahmad Alauddin Bin Arifin Muhammad Shahid Bhatti Abid Sohail Rohail Hassan Department of Information Technology University of Central PunjabLahore54000Pakistan Department of Communication Technology and Network Faculty of Computer Science and Information TechnologyUniversity Putra MalaysiaSalengor43400Malaysia Department of Computer Science Comsats University IslamabadLahore Campus54000Pakistan Othman Yeop Abdullah Graduate School of Business University Utara MalaysiaKuala Lumpur50300Malaysia
These days,deep learning and computer vision are much-growing fields in this modern world of information *** learning algorithms and computer vision have achieved great success in different applications like image cla... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
VeriFace:Defending against adversarial attacks in Face Verification Systems
收藏 引用
Computers, Materials & Continua 2023年 第9期76卷 3151-3166页
作者: Awny Sayed Sohair Kinlany Alaa Zaki Ahmed Mahfouz Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Computer Science Department Faculty of ScienceMinia UniversityAl MinyaEgypt Faculty of Computer Studies Arab Open UniversityMuscatOman
Face verification systems are critical in a wide range of applications,such as security systems and biometric ***,these systems are vulnerable to adversarial attacks,which can significantly compromise their accuracy a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
adversarial attacks on Content-Based Filtering Journal Recommender Systems
收藏 引用
Computers, Materials & Continua 2020年 第9期64卷 1755-1770页
作者: Zhaoquan Gu Yinyin Cai Sheng Wang Mohan Li Jing Qiu Shen Su Xiaojiang Du Zhihong Tian Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhouChina Department of Computer and Information Sciences Temple UniversityPhiladelphiaUSA
Recommender systems are very useful for people to explore what they really *** papers are important achievements for researchers and they often have a great deal of choice to submit their *** order to improve the effi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Overview of adversarial attacks and Defenses
收藏 引用
Journal of Information Hiding and Privacy Protection 2022年 第1期4卷 15-24页
作者: Kai Chen Jinwei Wang Jiawei Zhang Nanjing University of Information Science and Technology Nanjing210044China
In recent years,machine learning has become more and more popular,especially the continuous development of deep learning technology,which has brought great revolutions to many *** tasks such as image classification,na... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
FedDAA:a robust federated learning framework to protect privacy and defend against adversarial attack
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 107-122页
作者: Shiwei LU Ruihu LI Wenbin LIU Fundamentals Department Air Force Engineering UniversityXi’an 710051China Institute of Advanced Computational Science and Technology Guangzhou UniversityGuangzhou 510006China
Federated learning(FL)has emerged to break data-silo and protect clients’privacy in the field of artificial ***,deep leakage from gradient(DLG)attack can fully reconstruct clients’data from the submitted gradient,wh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning attacks in the Context of Bayesian Networks:An Empirical Study
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第5期139卷 1635-1654页
作者: Shahad Alzahrani Hatim Alsuwat Emad Alsuwat Independent Researcher Specializing in Data Security and Privacy Taif26571Saudi Arabia Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah24382Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif26571Saudi Arabia
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among ***,the reliability and integrity of learned Bayesian network models are highly dependent on the quality... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论