咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 控制科学与工程
    • 3 篇 软件工程
    • 2 篇 机械工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...

主题

  • 7 篇 backdoor attack
  • 1 篇 image classifica...
  • 1 篇 quantum artifici...
  • 1 篇 ai security
  • 1 篇 dnn training pro...
  • 1 篇 trojan horses
  • 1 篇 deep learning
  • 1 篇 nonpoisoning-bas...
  • 1 篇 transfer learnin...
  • 1 篇 brain-computer i...
  • 1 篇 variational quan...
  • 1 篇 invasive softwar...
  • 1 篇 deep learning (a...
  • 1 篇 poisoning attack
  • 1 篇 steganography
  • 1 篇 mathematical bac...
  • 1 篇 quantum neural n...
  • 1 篇 deep neural netw...
  • 1 篇 computer network...
  • 1 篇 machine learning...

机构

  • 1 篇 school of cyber ...
  • 1 篇 school of artifi...
  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 advanced cryptog...
  • 1 篇 department of in...
  • 1 篇 faculty of compu...
  • 1 篇 beijing institut...
  • 1 篇 china informatio...
  • 1 篇 zhejiang lab
  • 1 篇 college of cyber...

作者

  • 1 篇 zhang quanxin
  • 1 篇 shi zhiwei
  • 1 篇 ma wencong
  • 1 篇 zhiying zhu
  • 1 篇 zonghao ying
  • 1 篇 surbhi bhatia
  • 1 篇 daniyal m.alghaz...
  • 1 篇 bin wu
  • 1 篇 xue jiang
  • 1 篇 honglu he
  • 1 篇 xinpeng zhang
  • 1 篇 osama bassam j.r...
  • 1 篇 xin li
  • 1 篇 张仕斌
  • 1 篇 黄晨猗
  • 1 篇 li yuanzhang
  • 1 篇 siyang li
  • 1 篇 lubin meng
  • 1 篇 wang yajie
  • 1 篇 syed hamid hasan

语言

  • 7 篇 英文
检索条件"主题词=Backdoor attack"
7 条 记 录,以下是1-10 订阅
排序:
A backdoor attack against quantum neural networks with limited information
收藏 引用
Chinese Physics B 2023年 第10期32卷 219-228页
作者: 黄晨猗 张仕斌 College of Cyberspace Security Chengdu University of Information TechnologyChengdu 610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu 610225China
backdoor attacks are emerging security threats to deep neural *** these attacks,adversaries manipulate the network by constructing training samples embedded with backdoor *** backdoored model performs as expected on c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Adaptive backdoor attack against Deep Neural Networks
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第9期136卷 2617-2633页
作者: Honglu He Zhiying Zhu Xinpeng Zhang School of Computer Science Fudan UniversityShanghai200433China
In recent years,the number of parameters of deep neural networks(DNNs)has been increasing *** training of DNNs is typically *** a result,many users leverage cloud computing and outsource their training *** computation... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Improved Optimized Model for Invisible backdoor attack Creation Using Steganography
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 1173-1193页
作者: Daniyal M.Alghazzawi Osama Bassam J.Rabie Surbhi Bhatia Syed Hamid Hasan Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversitySaudi Arabia
The Deep Neural Networks(DNN)training process is widely affected by backdoor *** backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
backdoor attacks on Image Classification Models in Deep Neural Networks
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 199-212页
作者: ZHANG Quanxin MA Wencong WANG Yajie ZHANG Yaoyuan SHI Zhiwei LI Yuanzhang Beijing Institute of Technology China Information Technology Security Evaluation Center
Deep neural network(DNN) is applied widely in many applications and achieves state-of-the-art performance. However, DNN lacks transparency and interpretability for users in structure. attackers can use this feature to... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Active poisoning: efficient backdoor attacks on transfer learning-based brain-computer interfaces
收藏 引用
Science China(Information Sciences) 2023年 第8期66卷 211-232页
作者: Xue JIANG Lubin MENG Siyang LI Dongrui WU School of Artificial Intel ligence and Automation Huazhong University of Science and Technology Zhejiang Lab
Transfer learning(TL) has been widely used in electroencephalogram(EEG)-based braincomputer interfaces(BCIs) for reducing calibration efforts. However, backdoor attacks could be introduced through TL. In such attacks,... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are *** trained on the dataset will passively implant the back... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Gaussian Noise-Based Algorithm for Enhancing backdoor attacks
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 361-387页
作者: Hong Huang Yunfei Wang Guotao Yuan Xin Li School of Computer Science and Engineering Sichuan University of Science&EngineeringYibin644000China
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论