咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 7 篇 生物工程
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 3 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 8 篇 数学
    • 7 篇 生物学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 5 篇 deep neural netw...
  • 2 篇 object detection
  • 2 篇 perturbation met...
  • 2 篇 training
  • 1 篇 semantic segment...
  • 1 篇 deep learning
  • 1 篇 hamming distance
  • 1 篇 task analysis
  • 1 篇 generative adver...
  • 1 篇 training data
  • 1 篇 signal processin...
  • 1 篇 mission critical...
  • 1 篇 internet
  • 1 篇 speech recogniti...
  • 1 篇 image coding
  • 1 篇 predictive model...
  • 1 篇 integer programm...
  • 1 篇 pixels
  • 1 篇 costs
  • 1 篇 semantics

机构

  • 16 篇 secure computing...
  • 11 篇 school of data s...
  • 10 篇 tsinghua shenzhe...
  • 8 篇 tencent ai lab
  • 4 篇 pcl research cen...
  • 3 篇 institute of inf...
  • 2 篇 nlpr/cripac inst...
  • 2 篇 university of el...
  • 2 篇 tencent
  • 2 篇 institute of art...
  • 2 篇 university of ch...
  • 2 篇 school of data s...
  • 2 篇 school of cyber ...
  • 2 篇 ocean university...
  • 2 篇 school of cyber ...
  • 1 篇 school of comput...
  • 1 篇 national laborat...
  • 1 篇 school of comput...
  • 1 篇 tencent data pla...
  • 1 篇 university at bu...

作者

  • 17 篇 wu baoyuan
  • 6 篇 zhang yong
  • 5 篇 li zhifeng
  • 5 篇 li yiming
  • 5 篇 xia shu-tao
  • 4 篇 cao xiaochun
  • 3 篇 jia xiaojun
  • 3 篇 bai jiawang
  • 3 篇 li longkang
  • 3 篇 yang yujiu
  • 3 篇 fan yanbo
  • 3 篇 baoyuan wu
  • 2 篇 yiming li
  • 2 篇 ma ke
  • 2 篇 wang jue
  • 2 篇 wei xingxing
  • 2 篇 zhai tongqing
  • 2 篇 jiang yong
  • 2 篇 xia weihao
  • 2 篇 shen fumin

语言

  • 20 篇 英文
检索条件"机构=Secure Computing Lab of Big Data"
20 条 记 录,以下是1-10 订阅
排序:
Learning to Accelerate Approximate Methods for Solving Integer Programming via Early Fixing
arXiv
收藏 引用
arXiv 2022年
作者: Li, Longkang Wu, Baoyuan The School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China
Integer programming (IP) is an important but challenging problem. Approximate methods have shown promising performance on solving the IP problem. However, we observed that a large fraction of variables solved by some ... 详细信息
来源: 评论
TARGETED ATTACK AGAINST DEEP NEURAL NETWORKS VIA FLIPPING LIMITED WEIGHT BITS  9
TARGETED ATTACK AGAINST DEEP NEURAL NETWORKS VIA FLIPPING LI...
收藏 引用
9th International Conference on Learning Representations, ICLR 2021
作者: Bai, Jiawang Wu, Baoyuan Zhang, Yong Li, Yiming Li, Zhifeng Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University China PCL Research Center of Networks and Communications Peng Cheng Laboratory China School of Data Science The Chinese University of HongKong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China Tencent AI Lab
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ... 详细信息
来源: 评论
Versatile Weight Attack via Flipping Limited Bits
arXiv
收藏 引用
arXiv 2022年
作者: Bai, Jiawang Wu, Baoyuan Li, Zhifeng Xia, Shu-Tao The Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518057 China The School of Data Science Chinese University of Hong Kong Shenzhen China The Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data 518100 China Tencent Data Platform Shenzhen518057 China
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ... 详细信息
来源: 评论
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Liang, Siyuan Wu, Baoyuan Fan, Yanbo Wei, Xingxing Cao, Xiaochun Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China Tencent Shenzhen China Institute of Artificial Intelligence Hangzhou Innovation Institute Beihang University Beijing China
Object detection has been widely used in many safety-critical tasks, such as autonomous driving. However, its vulnerability to adversarial examples has not been sufficiently studied, especially under the practical sce... 详细信息
来源: 评论
LAS-AT: Adversarial Training with Learnable Attack Strategy
arXiv
收藏 引用
arXiv 2022年
作者: Jia, Xiaojun Zhang, Yong Wu, Baoyuan Ma, Ke Wang, Jue Cao, Xiaochun Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyberspace Security University of Chinese Academy of Sciences Beijing China Tencent AI Lab Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Adversarial training (AT) is always formulated as a minimax problem, of which the performance depends on the inner optimization that involves the generation of adversarial examples (AEs). Most previous methods adopt P... 详细信息
来源: 评论
Prototype-supervised adversarial network for targeted attack of deep hashing
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Xunguang Zhang, Zheng Wu, Baoyuan Shen, Fumin Lu, Guangming Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data University of Electronic Science and Technology of China Koala Uran Tech
Due to its powerful capability of representation learning and high-efficiency computation, deep hashing has made significant progress in large-scale image retrieval. However, deep hashing networks are vulnerable to ad... 详细信息
来源: 评论
Probabilistic modeling of semantic ambiguity for scene graph generation
arXiv
收藏 引用
arXiv 2021年
作者: Yang, Gengcong Zhang, Jingyi Zhang, Yong Wu, Baoyuan Yang, Yujiu Tsinghua Shenzhen International Graduate School Tsinghua University China University of Electronic Science and Technology of China China Tencent AI Lab China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China
To generate "accurate" scene graphs, almost all existing methods predict pairwise relationships in a deterministic manner. However, we argue that visual relationships are often semantically ambiguous. Specif... 详细信息
来源: 评论
Towards open-world text-guided face image generation and manipulation
arXiv
收藏 引用
arXiv 2021年
作者: Xia, Weihao Yang, Yujiu Xue, Jing-Hao Wu, Baoyuan Tsinghua Shenzhen International Graduate School Tsinghua University China Department of Statistical Science University College London United Kingdom School of Data Science Chinese University of Hongkong Shenzhen China and Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China
—The existing text-guided image synthesis methods can only produce limited quality results with at most 2562 resolution and the textual instructions are constrained in a small Corpus. In this work, we propose a unifi... 详细信息
来源: 评论
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
arXiv
收藏 引用
arXiv 2021年
作者: Bai, Jiawang Wu, Baoyuan Zhang, Yong Li, Yiming Li, Zhifeng Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University China PCL Research Center of Networks and Communications Peng Cheng Laboratory China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China Tencent AI Lab United States
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ... 详细信息
来源: 评论
Prior-Guided Adversarial Initialization for Fast Adversarial Training
arXiv
收藏 引用
arXiv 2022年
作者: Jia, Xiaojun Zhang, Yong Wei, Xingxing Wu, Baoyuan Ma, Ke Wang, Jue Cao, Xiaochun SKLOIS Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Tencent AI Lab Shenzhen China Institute of Artificial Intelligence Beihang University Beijing China School of Data Science Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China School of Computer Science and Technology UCAS Beijing China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen518107 China
Fast adversarial training (FAT) effectively improves the efficiency of standard adversarial training (SAT). However, initial FAT encounters catastrophic overfitting, i.e., the robust accuracy against adversarial attac... 详细信息
来源: 评论