咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 7 篇 生物工程
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 3 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 13 篇 理学
    • 8 篇 数学
    • 7 篇 生物学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 5 篇 deep neural netw...
  • 2 篇 object detection
  • 2 篇 perturbation met...
  • 2 篇 training
  • 1 篇 semantic segment...
  • 1 篇 deep learning
  • 1 篇 hamming distance
  • 1 篇 task analysis
  • 1 篇 generative adver...
  • 1 篇 training data
  • 1 篇 signal processin...
  • 1 篇 mission critical...
  • 1 篇 internet
  • 1 篇 speech recogniti...
  • 1 篇 image coding
  • 1 篇 predictive model...
  • 1 篇 integer programm...
  • 1 篇 pixels
  • 1 篇 costs
  • 1 篇 semantics

机构

  • 16 篇 secure computing...
  • 11 篇 school of data s...
  • 10 篇 tsinghua shenzhe...
  • 8 篇 tencent ai lab
  • 4 篇 pcl research cen...
  • 3 篇 institute of inf...
  • 2 篇 nlpr/cripac inst...
  • 2 篇 university of el...
  • 2 篇 tencent
  • 2 篇 institute of art...
  • 2 篇 university of ch...
  • 2 篇 school of data s...
  • 2 篇 school of cyber ...
  • 2 篇 ocean university...
  • 2 篇 school of cyber ...
  • 1 篇 school of comput...
  • 1 篇 national laborat...
  • 1 篇 school of comput...
  • 1 篇 tencent data pla...
  • 1 篇 university at bu...

作者

  • 17 篇 wu baoyuan
  • 6 篇 zhang yong
  • 5 篇 li zhifeng
  • 5 篇 li yiming
  • 5 篇 xia shu-tao
  • 4 篇 cao xiaochun
  • 3 篇 jia xiaojun
  • 3 篇 bai jiawang
  • 3 篇 li longkang
  • 3 篇 yang yujiu
  • 3 篇 fan yanbo
  • 3 篇 baoyuan wu
  • 2 篇 yiming li
  • 2 篇 ma ke
  • 2 篇 wang jue
  • 2 篇 wei xingxing
  • 2 篇 zhai tongqing
  • 2 篇 jiang yong
  • 2 篇 xia weihao
  • 2 篇 shen fumin

语言

  • 20 篇 英文
检索条件"机构=Secure Computing Lab of Big Data"
20 条 记 录,以下是11-20 订阅
排序:
Backdoor Attack Against Speaker Verification
Backdoor Attack Against Speaker Verification
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Tongqing Zhai Yiming Li Ziqi Zhang Baoyuan Wu Yong Jiang Shu-Tao Xia Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen China
Speaker verification has been widely and successfully adopted in many mission-critical areas for user identification. The training of speaker verification requires a large amount of data, therefore users usually need ... 详细信息
来源: 评论
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Liang, Siyuan Li, Longkang Fan, Yanbo Jia, Xiaojun Li, Jingzhi Wu, Baoyuan Cao, Xiaochun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Data Science Secure Computing Lab of Big Data The Chinese University of Hong Kong Shenzhen China Tencent AI Lab Shenzhen China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen China
Recent studies have shown that detectors based on deep models are vulnerable to adversarial examples, even in the black-box scenario where the attacker cannot access the model information. Most existing attack methods... 详细信息
来源: 评论
Invisible Backdoor Attack with Sample-Specific Triggers
Invisible Backdoor Attack with Sample-Specific Triggers
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Yuezun Li Yiming Li Baoyuan Wu Longkang Li Ran He Siwei Lyu Ocean University of China Qingdao China Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China NLPR/CRIPAC Institute of Automation Chinese Academy of Sciences Beijing China University at Buffalo SUNY NY USA
Recently, backdoor attacks pose a new security threat to the training process of deep neural networks (DNNs). Attackers intend to inject hidden backdoors into DNNs, such that the attacked model performs well on benign... 详细信息
来源: 评论
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
Parallel Rectangle Flip Attack: A Query-based Black-box Atta...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Siyuan Liang Baoyuan Wu Yanbo Fan Xingxing Wei Xiaochun Cao Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China Tencent Shenzhen China Institute of Artificial Intelligence Hangzhou Innovation Institute Beihang University Beijing China
Object detection has been widely used in many safety- critical tasks, such as autonomous driving. However, its vulnerability to adversarial examples has not been sufficiently studied, especially under the practical sc... 详细信息
来源: 评论
Rethinking the trigger of backdoor attack
arXiv
收藏 引用
arXiv 2020年
作者: Li, Yiming Zhai, Tongqing Wu, Baoyuan Jiang, Yong Li, Zhifeng Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China Tencent AI Lab Shenzhen China
Backdoor attack intends to inject hidden backdoor into the deep neural networks (DNNs), such that the prediction of the infected model will be maliciously changed if the hidden backdoor is activated by the attacker-de... 详细信息
来源: 评论
TediGAN: Text-guided diverse face image generation and manipulation
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Weihao Yang, Yujiu Xue, Jing-Hao Wu, Baoyuan Tsinghua Shenzhen International Graduate School Tsinghua University China Department of Statistical Science University College London United Kingdom School of Data Science Chinese University of Hongkong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China
In this work, we propose TediGAN, a novel framework for multi-modal image generation and manipulation with textual descriptions. The proposed method consists of three components: StyleGAN inversion module, visual-ling... 详细信息
来源: 评论
Backdoor attack against speaker verification
arXiv
收藏 引用
arXiv 2020年
作者: Zhai, Tongqing Li, Yiming Zhang, Ziqi Wu, Baoyuan Jiang, Yong Xia, Shu-Tao Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen China
Speaker verification has been widely and successfully adopted in many mission-critical areas for user identification. The training of speaker verification requires a large amount of data, therefore users usually need ... 详细信息
来源: 评论
Pixel-wise dense detector for image inpainting
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Ruisong Quan, Weize Wu, Baoyuan Li, Zhifeng Yan, Dong-Ming National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing100190 China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing100049 China School of Data Science Chinese University of Hong Kong Shenzhen Hong Kong Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data China Tencent AI Lab Shenzhen China
Recent GAN-based image inpainting approaches adopt an average strategy to discriminate the generated image and output a scalar, which inevitably lose the position information of visual artifacts. Moreover, the adversa... 详细信息
来源: 评论
Dual ResGCN for balanced scene graph generation
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Jingyi Zhang, Yong Wu, Baoyuan Fan, Yanbo Shen, Fumin Shen, Heng Tao Center for Future Media University of Electronic Science and Technology of China Chengdu610054 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Data Science Chinese University of Hong Kong Shenzhen Shenzhen518172 Hong Kong Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen518172 China Tencent AI Lab Shenzhen519000 China
Visual scene graph generation is a challenging task. Previous works have achieved great progress, but most of them do not explicitly consider the class imbalance issue in scene graph generation. Models learned without... 详细信息
来源: 评论
Invisible backdoor attack with sample-specific triggers
arXiv
收藏 引用
arXiv 2020年
作者: Li, Yuezun Li, Yiming Wu, Baoyuan Li, Longkang He, Ran Lyu, Siwei Ocean University of China Qingdao China School of Data Science The Chinese University of Hong Kong Shenzhen China Secure Computing Lab of Big Data Shenzhen Research Institute of Big Data Shenzhen China Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China NLPR/CRIPAC Institute of Automation Chinese Academy of Sciences Beijing China University at Buffalo SUNY NY United States
Recently, backdoor attacks pose a new security threat to the training process of deep neural networks (DNNs). Attackers intend to inject hidden backdoors into DNNs, such that the attacked model performs well on benign... 详细信息
来源: 评论