咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 22 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 15 篇 计算机科学与技术...
    • 8 篇 控制科学与工程
    • 7 篇 软件工程
    • 5 篇 机械工程
    • 5 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 生物工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 公安技术
  • 6 篇 理学
    • 2 篇 生物学
    • 2 篇 系统科学
    • 1 篇 数学
    • 1 篇 化学
  • 6 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 4 篇 文学
    • 4 篇 外国语言文学
  • 1 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 22 篇 adversarial atta...
  • 7 篇 deep learning
  • 6 篇 machine learning
  • 3 篇 reinforcement le...
  • 3 篇 robustness
  • 3 篇 adversarial exam...
  • 2 篇 adversarial defe...
  • 2 篇 autonomous vehic...
  • 2 篇 artificial intel...
  • 2 篇 adversarial robu...
  • 2 篇 autoencoder
  • 2 篇 defense
  • 2 篇 adversarial trai...
  • 1 篇 decision-making
  • 1 篇 ensemble cluster...
  • 1 篇 deep neural netw...
  • 1 篇 ai
  • 1 篇 filter defense
  • 1 篇 text classificat...
  • 1 篇 robust defense

机构

  • 1 篇 school of comput...
  • 1 篇 school of life s...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 college of compu...
  • 1 篇 school of mechan...
  • 1 篇 institute of pho...
  • 1 篇 school of civil ...
  • 1 篇 jinan geotechnic...
  • 1 篇 cloudemy technol...
  • 1 篇 fujian provincia...
  • 1 篇 school of manage...
  • 1 篇 college of compu...
  • 1 篇 school of electr...
  • 1 篇 school of engine...
  • 1 篇 science and tech...
  • 1 篇 department of el...
  • 1 篇 school of comput...
  • 1 篇 aecc sichuan gas...
  • 1 篇 college of econo...

作者

  • 2 篇 xiangkun he
  • 2 篇 chen lv
  • 2 篇 hang su
  • 2 篇 dongrui wu
  • 1 篇 wenli zeng
  • 1 篇 parijat rai
  • 1 篇 adil khan
  • 1 篇 qinsheng zhu
  • 1 篇 jiaxin xu
  • 1 篇 wenhui huang
  • 1 篇 endong tong
  • 1 篇 wael said
  • 1 篇 yong zhou
  • 1 篇 nitin naik
  • 1 篇 huaji zhou
  • 1 篇 jia liu
  • 1 篇 xingxing gong
  • 1 篇 mehedi masud
  • 1 篇 xinning zhou
  • 1 篇 kui ren

语言

  • 22 篇 英文
检索条件"主题词=adversarial attack"
22 条 记 录,以下是1-10 订阅
排序:
adversarial attack-Based Robustness Evaluation for Trustworthy AI
收藏 引用
Computer Systems Science & Engineering 2023年 第11期47卷 1919-1935页
作者: Eungyu Lee Yongsoo Lee Taejin Lee Department of Information Security Hoseo UniversityAsan 31499Korea
Artificial Intelligence(AI)technology has been extensively researched in various fields,including the field of malware *** models must be trustworthy to introduce AI systems into critical decisionmaking and resource p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Alpha Fusion adversarial attack Analysis Using Deep Learning
收藏 引用
Computer Systems Science & Engineering 2023年 第7期46卷 461-473页
作者: Mohibullah Khan Ata Ullah Isra Naz Sajjad Haider Nz Jhanji Mohammad Shorfuzzaman Mehedi Masud Department of Computer Science National University of Modern LanguagesIslamabadPakistan Department of Computer Science COMSATS University IslamabadIslamabadPakistan School of Computer Science(SCS) Taylor’s UniversitySelangorMalaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia
The deep learning model encompasses a powerful learning ability that integrates the feature extraction,and classification method to improve *** Neural Networks(CNN)perform well in machine learning and image processing... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient Character-Level adversarial attack Inspired by Textual Variations in Online Social Media Platforms
收藏 引用
Computer Systems Science & Engineering 2023年 第12期47卷 2869-2894页
作者: Jebran Khan Kashif Ahmad Kyung-Ah Sohn Department of Artificial Intelligence Ajou UniversitySuwonKorea Department of Computer Science Munster Technological UniversityCorkIreland Department of Software and Computer Engineering Ajou UniversitySuwonKorea
In recent years,the growing popularity of social media platforms has led to several interesting natural language processing(NLP)***,these social media-based NLP applications are subject to different types of adversari... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
adversarial attack and defense in reinforcement learning-from AI security view
收藏 引用
Cybersecurity 2019年 第1期2卷 167-188页
作者: Tong Chen Jiqiang Liu Yingxiao Xiang Wenjia Niu Endong Tong Zhen Han Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijingChina
Reinforcement learning is a core technology for modern artificial intelligence,and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System(CAV).Therefore,a relia... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Understanding adversarial attacks on observations in deep reinforcement learning
收藏 引用
Science China(Information Sciences) 2024年 第5期67卷 69-83页
作者: You QIAOBEN Chengyang YING Xinning ZHOU Hang SU Jun ZHU Bo ZHANG Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua-Bosch Joint Center for Machine Learning Institute for Artificial Intelligence Tsinghua University Peng Cheng Laboratory
Deep reinforcement learning models are vulnerable to adversarial attacks that can decrease the cumulative expected reward of a victim by manipulating its observations. Despite the efficiency of previous optimization-b... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Towards sustainable adversarial training with successive perturbation generation
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2024年 第4期25卷 527-539页
作者: Wei LIN Lichuan LIAO College of Computer Science and Mathematics Fujian University of TechnologyFuzhou 350118China College of Economics and Management Xi’an University of TechnologyXi’an 710048China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou 350118China
adversarial training with online-generated adversarial examples has achieved promising performance in defending adversarial attacks and improving robustness of convolutional neural network ***,most existing adversaria... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Toward Trustworthy Decision-Making for Autonomous Vehicles:A Robust Reinforcement Learning Approach with Safety Guarantees
收藏 引用
Engineering 2024年 第2期33卷 77-89页
作者: Xiangkun He Wenhui Huang Chen Lv School of Mechanical and Aerospace Engineering Nanyang Technological UniversitySingapore 639798Singapore
While autonomous vehicles are vital components of intelligent transportation systems,ensuring the trustworthiness of decision-making remains a substantial challenge in realizing autonomous ***,we present a novel robus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Classification of adversarial attacks Using Ensemble Clustering Approach
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2479-2498页
作者: Pongsakorn Tatongjai Tossapon Boongoen Natthakan Iam-On Nitin Naik Longzhi Yang Center of Excellence in AI&Emerging Technologies School of ITMae Fah Luang UniversityChiang RaiThailand Department of Computer Science Aberystwyth UniversityAberystwythUnited Kingdom School of Informatics and Digital Engineering Aston UniversityBirminghamUnited Kingdom Department of Computer and Information Sciences Northumbria UniversityNewcastleUnited Kingdom
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Denoised Internal Models:A Brain-inspired Autoencoder Against adversarial attacks
收藏 引用
Machine Intelligence Research 2022年 第5期19卷 456-471页
作者: Kai-Yuan Liu Xing-Yu Li Yu-Rui Lai Hang Su Jia-Chen Wang Chun-Xu Guo Hong Xie Ji-Song Guan Yi Zhou School of Life Sciences and Technology ShanghaiTech UniversityShanghai 201210China Shanghai Center for Brain Science and Brain-inspired Technology Shanghai 201602China School of Life Sciences Tsinghua UniversityBeijing 100084China National Engineering Laboratory for Brain-inspired Intelligence Technology and Application School of Information Science and TechnologyUniversity of Science and Technology of ChinaHefei 230026China Institute of Photonic Chips University of Shanghai for Science and TechnologyShanghai 200093China Centre for Artificial-intelligence Nanophotonics School of Optical-electrical and Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghai 200093China
Despite its great success,deep learning severely suffers from robustness;i.e.,deep neural networks are very vulnerable to adversarial attacks,even the simplest *** by recent advances in brain science,we propose the de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
adversarial attacks on Featureless Deep Learning Malicious URLs Detection
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 921-939页
作者: Bader Rasheed Adil Khan S.M.Ahsan Kazmi Rasheed Hussain Md.Jalil Piran Doug Young Suh Institute of Data Science and Articial Intelligence Innopolis UniversityInnopolis420500Russia Institute of Information Security and Cyberphysical Systems Innopolis UniversityInnopolis420500Russia Department of Computer Science and Engineering Sejong UniversitySeoulKorea Department of Electronics Engineering Kyung Hee UniversityYonginKorea
Detecting malicious Uniform Resource Locators(URLs)is crucially important to prevent attackers from committing *** researches have investigated the role of machine learning(ML)models to detect malicious *** using ML a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论