-
1Dissertation/ Thesis
المؤلفون: Sedar, Mohottige Roshan Madhusanka
المساهمون: University/Department: Universitat Politècnica de Catalunya. Departament de Teoria del Senyal i Comunicacions
Thesis Advisors: Alonso Zarate, Jesús, Vázquez Gallego, Francisco, Alonso Zárate, Luis Gonzaga
المصدر: TDX (Tesis Doctorals en Xarxa)
مصطلحات موضوعية: Vehicle-to-everything (V2X) Communication, Internet-of-Vehicles (IoV), Artificial Intelligence (AI), Machine Learning (ML), Reinforcement Learning (RL), Deep Reinforcement Learning (DRL), Transfer Learning (TL), Vehicular Communication, V2X Cybersecurity, Closed-Loop Security, Misbehaviour Detection, Adversarial Defence, Trust Management, Collaborative Misbehaviour Detection, Vehicle Authentication, Comunicació vehicle a tot (V2X), Internet dels vehicles (IoV), Intel ·ligència artificial (IA), Aprenentatge automàtic (ML), Aprenentatge per reforç (RL), Aprenentatge per reforç profund (DRL), Aprenentatge per transferència (TL), Comunicació vehicular, Ciberseguretat V2X, Seguretat de circuit tancat, Detecció de males conductes, Defensa adversarial, Gestió de confiança, Detecció col·laborativa de males conductes, Autenticació de vehicles, Comunicación vehículo a todo (V2X), Internet de los vehículos (IoV), Inteligencia artificial (IA), Aprendizaje automático (ML), Aprendizaje por refuerzo (RL), Aprendizaje por refuerzo profundo (DRL), Aprendizaje por transferencia (TL), Comunicación vehicular, Ciberseguridad V2X, Seguridad de circuito cerrado, Detección de malas conductas, Gestión de confianza, Detección colaborativa de malas conductas, Autenticación de vehículos, Àrees temàtiques de la UPC::Enginyeria de la telecomunicació
Time: 621.3
وصف الملف: application/pdf
URL الوصول: http://hdl.handle.net/10803/692552
-
2Academic Journal
المؤلفون: Wei Gao, Yunqing Liu, Yi Zeng, Quanyang Liu, Qi Li
المصدر: Sensors; Volume 23; Issue 4; Pages: 2266
مصطلحات موضوعية: SAR image, ship target detection, adversarial attack, adversarial defence, generalization
وصف الملف: application/pdf
Relation: Sensing and Imaging; https://dx.doi.org/10.3390/s23042266
الاتاحة: https://doi.org/10.3390/s23042266
-
3Academic Journal
المؤلفون: Zixiao Kong, Jingfeng Xue, Zhenyan Liu, Yong Wang, Weijie Han
المصدر: Electronics, Vol 12, Iss 7, p 1751 (2023)
مصطلحات موضوعية: stateful detection, adversarial defence, artificial intelligence security, privacy protection, Electronics, TK7800-8360
Relation: https://www.mdpi.com/2079-9292/12/7/1751; https://doaj.org/toc/2079-9292; https://doaj.org/article/87b3c82f14b943a8a2a907b7f896472f
-
4Academic Journal
المصدر: Jisuanji kexue, Vol 48, Iss 10, Pp 258-265 (2021)
مصطلحات موضوعية: image retrieval, adversarial defence, deep learning, feature transformation, adversarial attack, Computer software, QA76.75-76.765, Technology (General), T1-995
وصف الملف: electronic resource
-
5Conference
المؤلفون: Lu, Junda, Miao, Yukai, Chen, Mingyang, Huang, Bo, Li, Bing, Wang, Wei, Vatsalan, Dinusha, Kaafar, Mohamed Ali
مصطلحات موضوعية: Adversarial Machine Learning, Adversarial Defence, Deep Hashing, Image Retrieval
Relation: https://repository.hkust.edu.hk/ir/Record/1783.1-136517; Proceedings - IEEE International Conference on Knowledge Graph, ICKG 2023, February 2024, article number 10412741, p. 176-183; https://doi.org/10.1109/ICKG59574.2023.00027; http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=&rft.volume=&rft.issue=&rft.date=2023&rft.spage=176&rft.aulast=Lu&rft.aufirst=Ju&rft.atitle=Distance+Maximization+and+Defences+on+Deep+Hashing+Based+Image+Retrieval&rft.title=2023+IEEE+INTERNATIONAL+CONFERENCE+ON+KNOWLEDGE+GRAPH,+ICKG; http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=001166570200022; http://www.scopus.com/record/display.url?eid=2-s2.0-85186139906&origin=inward
الاتاحة: https://repository.hkust.edu.hk/ir/Record/1783.1-136517
https://doi.org/10.1109/ICKG59574.2023.00027
http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=&rft.volume=&rft.issue=&rft.date=2023&rft.spage=176&rft.aulast=Lu&rft.aufirst=Ju&rft.atitle=Distance+Maximization+and+Defences+on+Deep+Hashing+Based+Image+Retrieval&rft.title=2023+IEEE+INTERNATIONAL+CONFERENCE+ON+KNOWLEDGE+GRAPH,+ICKG
http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=001166570200022
http://www.scopus.com/record/display.url?eid=2-s2.0-85186139906&origin=inward -
6Academic Journal
المؤلفون: Shrestha, Abhishek
المساهمون: Stolzenburg, Frieder
مصطلحات موضوعية: Deep learning, Adversarial attacks, Transferability property, Adversarial defence
وصف الملف: application/pdf
Relation: DC@KI2023: Proceedings of Doctoral Consortium at KI 2023; https://dl.gi.de/handle/20.500.12116/42399
-
7
-
8
المؤلفون: Lu, Junda
مصطلحات موضوعية: 461199 Machine learning not elsewhere classified, Adversarial Defence, Adversarial Machine Learning, Image Retrieval, Adversarial Attack, 461101 Adversarial machine learning
-
9Dissertation/ Thesis
المؤلفون: 余昊祥, Yu, Hao-Hsiang
المساهمون: 胡毓忠, Hu,Yuh-Jong
مصطلحات موضوعية: 假新聞偵測, 對抗式攻擊, Fake news detection, Adversarial attack, Adversarial Defence, TextFooler
وصف الملف: 3436463 bytes; application/pdf
Relation: [1] Nic Newman, Richard Fletcher, and David A. L. Levy, et al. digital-newsreport2016. Digital Journalism. https://reutersinstitute.politics.ox.ac.uk/\nour-research/digital-news-report-2016, 2016.\n[2] Edson C., Tandoc Jr., and Zheng Wei Lim, et al. Defining fake news. Digital Jour-nalism. https://doi.org/10.1080/21670811.2017.1360143, 2018.\n[3] Ashish Vaswani, Noam M. Shazeer, and Niki Parmar, et al. Attention is all you need.\narXiv preprint arXiv:1706.03762, 2017.\n[4] Jacob Devlin, MingWei Chang, and Kenton Lee, et al. Bert: Pretraining of deep bidirectional transformers for language understanding. arXiv preprint\narXiv:1810.04805, 2019.\n[5] Haoming Guo, Tianyi Huan, and Huixuan Huang, et al. Detecting covid19 conspir-acy theories with transformers and tfidf. arXiv preprint arXiv:2205.00377, 2022.\n[6] Jin Di, Jin Zhijing, and Zhou Joey Tianyi, et al. Is bert really robust? natural language attack on text classification and entailment. arXiv preprint arXiv:1907.11932, 2019.\n[7] Shilin Qiu, Qihe Liu, and Shijie Zhou, et al. Adversarial attack and defense tech-nologies in natural language processing: A survey. Neurocomputing, 2022.\n[8] Ji Gao, Jack Lanchantin, and Mary Lou Soffa, et al. Blackbox generation of adver-sarial text sequences to evade deep learning classifiers. In 2018 IEEE Security and\nPrivacy Workshops (SPW). IEEE, 2018.\n[9] Robin Jia, Percy Liang. Adversarial examples for evaluating reading comprehension systems. arXiv preprint arXiv:1707.07328, 2017.\n[10] Zhihong Shao, Zitao Liu, and Jiyong Zhang, et al. Advexpander: Generating natu-ral language adversarial examples by expanding text. IEEE/ACM Transactions on\nAudio, Speech, and Language Processing, 2022.\n[11] Daniel Matthew Cer, Yinfei Yang, and Shengyi Kong, et al. Universal sentence encoder. arXiv preprint arXiv:1803.11175, 2018.\n[12] Mein Gunnar, Hartman Kevin, Morris Andrew. Firebert: Hardening bertbased clas-sifiers against adversarial attack. arXiv preprint arXiv:2008.04203, 2020.\n[13] Page Lawrence, Brin Sergey, and Motwani Rajeev, et al. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab, 1999.\n[14] Mihalcea Rada, Tarau Paul. Textrank: Bringing order into text. In Proceedings of the 2004 conference on empirical methods in natural language processing, 2004.\n[15] Grootendorst, Maarten. Keybert: Minimal keyword extraction with bert. [Internet].\nAvailable: https://maartengr. github. io/KeyBERT/index. html, 2020.\n[16] Nikola Mrksic, Diarmuid Ó Séaghdha, and Blaise Thomson, et al. Counterfitting word vectors to linguistic constraints. In NAACL, 2016.; G0106971008; https://nccur.lib.nccu.edu.tw//handle/140.119/141837; https://nccur.lib.nccu.edu.tw/bitstream/140.119/141837/1/100801.pdf
-
10Dissertation/ Thesis
المؤلفون: Jayhne, Mukkul I
المساهمون: Wang, Xuyu, Ouyang, Jinsong
المصدر: oai:alma.01CALS_USL:11242312150001671
مصطلحات موضوعية: ECG Classification, Adversarial Attacks, Adversarial Defence
-
11
المؤلفون: Киндулов Михаил Львович, Kindulov Mihail Lvovic
المساهمون: Блеканов Иван Станиславович, Blekanov Ivan Stanislavovic, Крылатов Александр Юрьевич, Krylatov Aleksandr Urevic
مصطلحات موضوعية: машинное обучение, нейронные сети, состязательные атаки, защита от состязательных атак, machine learning, neural networks, adversarial attacks, adversarial defence
Relation: 048221; http://hdl.handle.net/11701/26412
الاتاحة: http://hdl.handle.net/11701/26412