咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 11 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 5 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 14 篇 adversarial exam...
  • 4 篇 speaker recognit...
  • 2 篇 secret sharing
  • 2 篇 generative adver...
  • 2 篇 neural networks
  • 2 篇 privacy-preservi...
  • 2 篇 servers
  • 2 篇 android
  • 2 篇 physical domain
  • 2 篇 machine learning
  • 2 篇 security
  • 2 篇 protocols
  • 2 篇 malware detectio...
  • 2 篇 data models
  • 2 篇 privacy
  • 2 篇 cryptography
  • 2 篇 live-streaming
  • 1 篇 ensemble learnin...
  • 1 篇 homomorphic encr...
  • 1 篇 deep neural netw...

机构

  • 2 篇 shanghai univ sc...
  • 1 篇 china assets cyb...
  • 1 篇 shanghai jiao to...
  • 1 篇 chinese acad sci...
  • 1 篇 zhejiang univers...
  • 1 篇 natl comp networ...
  • 1 篇 zhejiang univers...
  • 1 篇 def ind secrecy ...
  • 1 篇 department of co...
  • 1 篇 zhejiang univ pe...
  • 1 篇 state grid infor...
  • 1 篇 beijing univ pos...
  • 1 篇 nanjing univ sci...
  • 1 篇 univ chinese aca...
  • 1 篇 zhejiang univ ke...
  • 1 篇 suny albany alba...
  • 1 篇 zhejiang univ sc...
  • 1 篇 shanghai jiao to...
  • 1 篇 zju hic peoples ...
  • 1 篇 jilin univ key l...

作者

  • 3 篇 ren kui
  • 3 篇 ba zhongjie
  • 3 篇 chen meng
  • 3 篇 lu li
  • 2 篇 lin feng
  • 2 篇 feng guorui
  • 2 篇 chen qianniu
  • 2 篇 li lu
  • 2 篇 zhang xinpeng
  • 2 篇 he guanghui
  • 2 篇 li wenjia
  • 2 篇 ren yanli
  • 1 篇 jiang jingyuan
  • 1 篇 wang qingyu
  • 1 篇 neha bala
  • 1 篇 li junbao
  • 1 篇 aemun ahmar
  • 1 篇 li kenli
  • 1 篇 zhongjie ba
  • 1 篇 meng chen

语言

  • 14 篇 英文
检索条件"主题词=Adversarial example attack"
14 条 记 录,以下是1-10 订阅
排序:
PPNNI: Privacy-Preserving Neural Network Inference Against adversarial example attack
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2024年 第6期17卷 4083-4096页
作者: He, Guanghui Ren, Yanli He, Gang Feng, Guorui Zhang, Xinpeng Shanghai Univ Sch Commun & Informat Engn Shanghai 200444 Peoples R China
Outsourced inference services have greatly promoted the popularization of deep learning, and neural network models can help users customize a series of personalized applications, e.g., face recognition, image classifi... 详细信息
来源: 评论
PhoneyTalker: An Out-of-the-Box Toolkit for adversarial example attack on Speaker Recognition  41
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Exam...
收藏 引用
41st IEEE Conference on Computer Communications (IEEE INFOCOM)
作者: Chen, Meng Lu, Li Ba, Zhongjie Ren, Kui Zhejiang Univ Sch Cyber Sci & Technol Hangzhou Zhejiang Peoples R China Zhejiang Univ Key Lab Blockchain & Cyberspace Governance Zhejia Hangzhou Zhejiang Peoples R China
Voice has become a fundamental method for human-computer interactions and person identification these days. Benefit from the rapid development of deep learning, speaker recognition exploiting voice biometrics has achi... 详细信息
来源: 评论
BypTalker: An Adaptive adversarial example attack to Bypass Prefilter-enabled Speaker Recognition  19
BypTalker: An Adaptive Adversarial Example Attack to Bypass ...
收藏 引用
19th International Conference on Mobility, Sensing and Networking (MSN)
作者: Chen, Qianniu Fu, Kang Lu, Li Chen, Meng Ba, Zhongjie Lin, Feng Ren, Kui Zhejiang Univ Sch Cyber Sci & Technol Coll Comp Sci & Technol Hangzhou Peoples R China
With the broad integration of deep learning in Speaker Recognition (SR) systems, adversarial example attacks have been a significant threat raising user security concerns. Nevertheless, recent studies demonstrate that... 详细信息
来源: 评论
Push the Limit of adversarial example attack on Speaker Recognition in Physical Domain  20
Push the Limit of Adversarial Example Attack on Speaker Reco...
收藏 引用
20th ACM Conference on Embedded Networked Sensor Systems (SenSys)
作者: Chen, Qianniu Chen, Meng Lu, Li Yu, Jiadi Chen, Yingying Wang, Zhibo Ba, Zhongjie Lin, Feng Ren, Kui Zhejiang Univ Hangzhou Peoples R China ZJU HIC Hangzhou Zhejiang Peoples R China Shanghai Jiao Tong Univ Shanghai Peoples R China Rutgers State Univ New Brunswick NJ USA
The integration of deep learning on Speaker Recognition (SR) advances its development and wide deployment, but also introduces the emerging threat of adversarial examples. However, only a few existing studies investig... 详细信息
来源: 评论
Study on the Method of adversarial example attack Based on MI-FGSM  17th
Study on the Method of Adversarial Example Attack Based on M...
收藏 引用
17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) / 14th International Conference on Frontiers of Information Technology, Applications and Tools (FITAT)
作者: Mao, Guanqiao Li, Lu Wang, Qingyu Li, Junbao Harbin Inst Technol Sch Elect & Informat Engn Harbin 150001 Peoples R China Def Ind Secrecy Examinat & Certificat Ctr Beijing 100089 Peoples R China
Deep neural network outperformed human beings in many fields such as image classification [1-3], object detection [4, 5], and image semantic segmentation [6] in recent years. But this model has security risks;for inst... 详细信息
来源: 评论
Privacy-Enhanced Federated GNN Inference Against adversarial example attack
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2024年
作者: He, Guanghui Ren, Yanli Jiang, Jingyuan Feng, Guorui Zhang, Xinpeng Shanghai Univ Sch Commun & Informat Engn Shanghai 200444 Peoples R China
Graph neural networks (GNNs) have become a powerful tool for processing and learning graph data. However, due to the existence of data silos, the privacy of data and the processing result is an important concern. Mean... 详细信息
来源: 评论
Push the Limit of adversarial example attack on Speaker Recognition in Physical Domain  22
Push the Limit of Adversarial Example Attack on Speaker Reco...
收藏 引用
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems
作者: Qianniu Chen Meng Chen Li Lu Jiadi Yu Yingying Chen Zhibo Wang Zhongjie Ba Feng Lin Kui Ren Zhejiang University and ZJU-HIC Zhejiang University Shanghai Jiao Tong University Rutgers University
The integration of deep learning on Speaker Recognition (SR) advances its development and wide deployment, but also introduces the emerging threat of adversarial examples. However, only a few existing studies investig... 详细信息
来源: 评论
DroidEnemy: Battling adversarial example attacks for Android malware detection
收藏 引用
Digital Communications and Networks 2022年 第6期8卷 1040-1047页
作者: Neha Bala Aemun Ahmar Wenjia Li Fernanda Tovar Arpit Battu Prachi Bambarkar Department of Computer Science New York Institute of TechnologyNew YorkNY10023USA
In recent years,we have witnessed a surge in mobile devices such as smartphones,tablets,smart watches,etc.,most of which are based on the Android operating ***,because these Android-based mobile devices are becoming i... 详细信息
来源: 评论
A Robust Malware Detection Approach for Android System against adversarial example attacks  5
A Robust Malware Detection Approach for Android System again...
收藏 引用
IEEE 5th International Conference on Collaboration and Internet Computing (CIC)
作者: Li, Wenjia Bala, Neha Ahmar, Aemun Tovar, Fernanda Battu, Arpit Bambarkar, Prachi New York Inst Technol Dept Comp Sci New York NY 10023 USA
In recent years, Android has become the leading smartphone operating system across the world. However, due to their increasing popularity, Android devices have become the primary target to mobile malware. To address t... 详细信息
来源: 评论
Reusable generator data-free knowledge distillation with hard loss simulation for image classification
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2025年 265卷
作者: Sun, Yafeng Wang, Xingwang Huang, Junhong Chen, Shilin Hou, Minghui Jilin Univ Coll Comp Sci & Technol Changchun 130012 Peoples R China Jilin Univ Key Lab Symbol Computat & Knowledge Engn Minist Educ Changchun 130012 Peoples R China
In many image classification scenarios where knowledge distillation (KD) is applied, multiple users need to train various student models that conform to the device's computational limitations at different times. H... 详细信息
来源: 评论