咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 2 篇 poisoning attack...
  • 2 篇 evasion attacks
  • 1 篇 multi-phases
  • 1 篇 trusted
  • 1 篇 defenses
  • 1 篇 hash functions s...
  • 1 篇 inference attack...
  • 1 篇 deep learning(dl...
  • 1 篇 homomorphic encr...
  • 1 篇 neural network
  • 1 篇 security and pri...
  • 1 篇 federated learni...

机构

  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 beijing key labo...
  • 1 篇 university of je...
  • 1 篇 department of co...

作者

  • 1 篇 ibrahim abaker t...
  • 1 篇 n.z.jhanjhi
  • 1 篇 muhammad tayyab
  • 1 篇 wei wang
  • 1 篇 pengrui liu
  • 1 篇 abdulaleem ali a...
  • 1 篇 xiangrui xu
  • 1 篇 mohsen marjani
  • 1 篇 abdulwahab ali a...

语言

  • 2 篇 英文
检索条件"主题词=evasion attacks"
2 条 记 录,以下是1-10 订阅
排序:
Threats,attacks and defenses to federated learning:issues,taxonomy and perspectives
收藏 引用
Cybersecurity 2022年 第2期5卷 56-74页
作者: Pengrui Liu Xiangrui Xu Wei Wang Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing100044China
Empirical attacks on Federated Learning(FL)systems indicate that FL is fraught with numerous attack surfaces throughout the FL *** attacks can not only cause models to fail in specific tasks,but also infer private ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 1183-1200页
作者: Muhammad Tayyab Mohsen Marjani N.Z.Jhanjhi Ibrahim Abaker Targio Hashim Abdulwahab Ali Almazroi Abdulaleem Ali Almazroi School of Computer Science and Engineering(SCE) Taylor’s University Lake-Side CampusSubang Jaya47500Malaysia Department of Computer Science College of Computing and InformaticsUniversity of SharjahSharjah27272UAE University of Jeddah College of Computing and Information Technology at KhulaisDepartment of Information TechnologyJeddahSaudi Arabia Department of Computer Science Rafha Community CollegeNorthern Border UniversityArar91431Saudi Arabia
Deep learning(DL)algorithms have been widely used in various security applications to enhance the performances of decision-based *** data added by an attacker can cause several security and privacy problems in the ope... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论