咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 生物工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
    • 1 篇 统计学(可授理学、...
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 deep learning
  • 1 篇 deep neural netw...
  • 1 篇 privacy-preservi...
  • 1 篇 intelligent rail...
  • 1 篇 contrastive lear...
  • 1 篇 digital storage
  • 1 篇 differential pri...
  • 1 篇 game theory
  • 1 篇 poisoning attack...
  • 1 篇 federated learni...
  • 1 篇 defenses

机构

  • 7 篇 zhejiang key lab...
  • 2 篇 the third resear...
  • 2 篇 binjiang institu...
  • 1 篇 college of lette...
  • 1 篇 zhengzhou univer...
  • 1 篇 state key labora...
  • 1 篇 school of automa...
  • 1 篇 zhejiang key lab...
  • 1 篇 institute of com...
  • 1 篇 inria bretagne r...
  • 1 篇 itrust singapore...
  • 1 篇 iflytek co. ltd.
  • 1 篇 network and info...
  • 1 篇 school of comput...
  • 1 篇 haihe lab of ita...
  • 1 篇 beijing jiaotong...
  • 1 篇 zhejiang gongsha...
  • 1 篇 zhejiang key lab...
  • 1 篇 sangfro technolo...
  • 1 篇 institute of inf...

作者

  • 5 篇 wang bin
  • 3 篇 bin wang
  • 2 篇 baigen cai
  • 2 篇 wang wei
  • 2 篇 yongsheng zhu
  • 2 篇 wei wang
  • 1 篇 zhao sunhang
  • 1 篇 lin xiaodong
  • 1 篇 wang xinyuan
  • 1 篇 jiao dai
  • 1 篇 wanqi wang
  • 1 篇 shi ziwei
  • 1 篇 liu kui
  • 1 篇 zhengxuan jin
  • 1 篇 sunhang zhao
  • 1 篇 chunlei chen
  • 1 篇 li qiang
  • 1 篇 zhang zhiwei
  • 1 篇 xu xiangrui
  • 1 篇 yuange ren

语言

  • 8 篇 英文
  • 1 篇 其他
检索条件"机构=Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity"
9 条 记 录,以下是1-10 订阅
排序:
Towards robust data augmentation for sequence recommendation  16
Towards robust data augmentation for sequence recommendation
收藏 引用
16th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024
作者: Chen, Yan Zhao, Sunhang Wang, Xinyuan Jin, Zhengxuan Lin, Zekai Wang, Bin The Third Research Institute of the Ministry of Public Security Shanghai China College of Letters and Science United States Zhejiang Gongshang University Computer Science and Technology China Binjiang Institute of Zhejiang University China Zhengzhou University School of Computer and Artificial Intelligence China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and Cybersecurity China
This paper presents RAS-Rec, a novel and robust approach to sequence recommendation that leverages the power of data augmentation techniques. RAS-Rec proposes data augmentation as a means to enhance the representation... 详细信息
来源: 评论
Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation Systems:Hierarchical Poisoning Attacks and Defenses in Federated Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第11期141卷 1305-1325页
作者: Yongsheng Zhu Chong Liu Chunlei Chen Xiaoting Lyu Zheng Chen Bin Wang Fuqiang Hu Hanxi Li Jiao Dai Baigen Cai Wei Wang School of Automation and Intelligence Beijing Jiaotong UniversityBeijing100044China Institute of Computing Technologies China Academy of Railway Sciences Corporation LimitedBeijing100081China School of Computer Science and Technology Beijing Jiaotong UniversityBeijing100044China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing100044China Institute of Infrastructure Inspection China Academy of Railway Sciences Corporation LimitedBeijing100081China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and CybersecurityHangzhou310053China
The development of Intelligent Railway Transportation Systems necessitates incorporating privacy-preserving mechanisms into AI models to protect sensitive information and enhance system *** learning offers a promising... 详细信息
来源: 评论
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography
Hey! You Photographed My Screen without Approved: A Practica...
收藏 引用
2022 International Conference on Networking and Network applications, NaNA 2022
作者: Liu, Kui Wang, Bin Shi, Ziwei Chen, Jiadong Zhang, Zhiwei School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China Network and Information Security Laboratory Hangzhou Hikvision Digital Technology Co. LTD. Hangzhou China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hangzhou310053 China
Nowadays , with the continuous development of digital media, electronic screens have become the most direct tool for people to interact with information. Various styles of electronic screens provide vivid information ... 详细信息
来源: 评论
PAGE: Equilibrate Personalization and Generalization in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Qian Wang, Zilong Hu, Jiaqi Yan, Haonan Zhou, Jianying Lin, Xiaodong State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Zhejiang China iTrust Singapore University of Technology and Design Singapore Singapore School of Computer Science University of Guelph Guelph Canada
Federated learning (FL) is becoming a major driving force behind machine learning as a service, where customers (clients) collaboratively benefit from shared local updates under the orchestration of the service provid... 详细信息
来源: 评论
Towards robust data augmentation for sequence recommendation
Towards robust data augmentation for sequence recommendation
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Yan Chen Sunhang Zhao Xinyuan Wang Zhengxuan Jin Zekai Lin Bin Wang The Third Research Institute of the Ministry of Public Security Shanghai China College of Letters and Science University of California Santa Barbara (UCSB) Computer Science and Technology Zhejiang Gongshang University China Binjiang Institute of Zhejiang University China School of Computer and Artificial Intelligence Zhengzhou University China Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and Cybersecurity China
This paper presents RAS-Rec, a novel and robust approach to sequence recommendation that leverages the power of data augmentation techniques. RAS-Rec proposes data augmentation as a means to enhance the representation...
来源: 评论
Two-in-One Solution: Simultaneously Enhancing Security and Privacy for Data-Driven Models in Mobile Edge Computing
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Liu, Pengrui Yuan, Xiaohan Wang, Wei Xu, Xiangrui Li, Tao Wang, Junyong Wang, Bin Pedrycz, Witold Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation 3 Shangyuancun Beijing100044 China Haihe Lab of ITAI Tianjin300450 China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hangzhou310053 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada
Data-driven models are widely employed in Mobile Edge Computing to satisfy the demands of Emerging Consumer applications. However, previous work demonstrates that data-driven models are susceptible to security threats... 详细信息
来源: 评论
Bfs2adv: Black-Box Adversarial Attack Towards Hard-to-Attack Short Texts
SSRN
收藏 引用
SSRN 2023年
作者: Han, Xu Li, Qiang Cao, Hongbo Han, Lei Wang, Bin Bao, Xuhua Han, Yufei Wang, Wei Beijing Key Laboratory of Security and Privacy of Intelligent Transportation Beijing Jiaotong University Beijing100044 China Beijing Institute of Computer Technology and Application Beijing100584 China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Zhejiang University Hangzhou310027 China Sangfro Technologies Inc Shenzhen518055 China INRIA Bretagne Rennes35042 France
The advent of Machine Learning as a Service (MLaaS) and deep learning applications has increased the susceptiblility of models to adversarial textual attacks, particularly in black-box settings. Prior work on black-bo... 详细信息
来源: 评论
Hessian-Free Second-Order Adversarial Examples for Adversarial Learning
arXiv
收藏 引用
arXiv 2022年
作者: Qian, Yaguan Wang, Yuqi Wang, Bin Gu, Zhaoquan Guo, Yuhan Swaileh, Wassim School of Big Data Science Zhejiang University of Science and Technology Hangzhou China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hikvision Digital Technology Co. Ltd Hangzhou China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China ETIS Research Laboratory CY Cergy Paris University Paris France
—Recent studies show deep neural networks (DNNs) are extremely vulnerable to the elaborately designed adversarial examples. Adversarial learning with those adversarial examples has been proved as one of the most effe... 详细信息
来源: 评论
[Retracted] Defending Privacy Inference Attacks to Federated Learning for Intelligent IoT with Parameter Compression
收藏 引用
Security and Communication Networks 2023年 第1期2023卷
作者: Yongsheng Zhu Hongbo Cao Yuange Ren Wanqi Wang Bin Wang Mingqing Hu Baigen Cai Wei Wang School of Electronic and Information Engineering Beijing Jiaotong University No. 3 Shangyuancun Beijing 100044 *** Institute of Computing Technologies China Academy of Railway Sciences Corporation Limited Beijing 100081 *** Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University No. 3 Shangyuancun Beijing 100044 *** Zhejiang Key Laboratory of Multi-Dimensional Perception Technology Application and Cybersecurity Hangzhou 310053 China iFLYTEK Co. Ltd. Hefei China
Federated learning has been popularly studied with people’s increasing awareness of privacy protection. It solves the problem of privacy leakage by its ability that allows many clients to train a collaborative model ...
来源: 评论