CNNs (Convolutional Neural Networks) have a good performance on most classification tasks, but they are vulnerable when meeting adversarial examples. Research and design of highly aggressive adversarial examples can h...
CNNs (Convolutional Neural Networks) have a good performance on most classification tasks, but they are vulnerable when meeting adversarial examples. Research and design of highly aggressive adversarial examples can help enhance the security and robustness of CNNs. The transferability of adversarial examples is still low in black-box settings. Therefore, an adversarial example method based on probability histogram equalization, namely HE-MI-FGSM (Histogram Equalization Momentum Iterative Fast Gradient Sign Method) is proposed. In each iteration of the adversarial example generation process, the original input image is randomly histogram equalized, and then the gradient is calculated to generate adversarial perturbations to mitigate overfitting in the adversarial example. The effectiveness of the method is verified on the ImageNet dataset. Compared with the advanced method I-FGSM (Iterative Fast Gradient Sign Method) and MI-FGSM (Momentum I-FGSM), the attack success rate in the adversarial training network increased by 27.9% and 7.7% on average, respectively.
Manually annotated corpora are valuable but scarce resources, yet for many annotation tasks such as treebanking and sequence lab.ling there exist multiple corpora with different and incompatible annotation guidelines ...
详细信息
There are a number of leaf recognition methods, but most of them are based on Euclidean space. In this paper, we will introduce a new description of feature for the leaf image recognition, which represents the leaf co...
详细信息
The conventional differential space-frequency codes (DSFC) based on cyclic delay diversity (CDD) only could achieve the same transmission rate with that of a single transmit antenna system, the spectral efficiency was...
详细信息
Text Sentiment Classification, a significant task in Natural Language processing, aims to comprehend user needs and expectations by categorizing the sentiments of texts posted on platforms. Despite their utility, exis...
详细信息
In order to optimize the pattern synthesis of multiple input and multiple output (MIMO) radar, immune mechanism is adopted to overcome the premature risk of differential evolution (DE) algorithm, namely immune differe...
详细信息
Jointly parsing two languages has been shown to improve accuracies on either or both sides. However, its search space is much bigger than the monolingual case, forcing existing approaches to employ complicated modelin...
详细信息
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudok...
详细信息
ISBN:
(纸本)9781510871076
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudoku,the proposed method can provide a safer scheme for data hiding than that with pure *** proposed method can hide a certain number of 9-ary numbers in a steganographic image which has a corresponding *** a 256*256 key matrix stretched from a size 9*9 Jigsaw Sudoku,secret message can be hidden in a vector image byte by byte in the form of *** results show that,the proposed method has a better peaksignal-to-noise-ratio(PSNR) compared with some other data hiding methods.
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bi...
详细信息
ISBN:
(纸本)9781510871076
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bits that are hidden into the two *** matrix M *,horizontal and vertical coordinate range from 0 to 255,and the pixel pairs in the cover image are used to help hide the secret message bytes in our *** paired pixel points into single and double number hidden in two *** show that the program can hide relatively more pixels in a cover image with less losing image quality.
This paper proposes a wide-band low-profile high-gain microstrip slot antenna loaded with a mushroom-type metasurface structure. By directly loading the metamaterial structure on the upper surface of the slot antenna,...
详细信息
ISBN:
(数字)9781728169668
ISBN:
(纸本)9781728169675
This paper proposes a wide-band low-profile high-gain microstrip slot antenna loaded with a mushroom-type metasurface structure. By directly loading the metamaterial structure on the upper surface of the slot antenna, low profile loading characteristics are realized and the antenna bandwidth is expanded. And by inserting the metal line array in the metamaterial dielectric board to improve the antenna gain. Change the gap width through the metasurface element with corner cut to produce a phase difference and realize circularly polarized. Simulation test and analysis of antenna through HFSS simulation software. The results show that the antenna with this metasurface has a profile height of only 0.09×λ(λ =27 mm), a relative impedance band-width of 20.4% (S 11
暂无评论