يعرض 1 - 11 نتائج من 11 نتيجة بحث عن '"Adversarial Defence"', وقت الاستعلام: 0.56s تنقيح النتائج
  1. 1
    Dissertation/ Thesis

    المساهمون: University/Department: Universitat Politècnica de Catalunya. Departament de Teoria del Senyal i Comunicacions

    Thesis Advisors: Alonso Zarate, Jesús, Vázquez Gallego, Francisco, Alonso Zárate, Luis Gonzaga

    المصدر: TDX (Tesis Doctorals en Xarxa)

    Time: 621.3

    وصف الملف: application/pdf

  2. 2
    Academic Journal

    المؤلفون: Wei Gao, Yunqing Liu, Yi Zeng, Quanyang Liu, Qi Li

    المصدر: Sensors; Volume 23; Issue 4; Pages: 2266

    وصف الملف: application/pdf

    Relation: Sensing and Imaging; https://dx.doi.org/10.3390/s23042266

  3. 3
    Academic Journal
  4. 4
    Academic Journal
  5. 5
    Conference
  6. 6
    Academic Journal
  7. 7
  8. 8
  9. 9
    Dissertation/ Thesis

    المؤلفون: 余昊祥, Yu, Hao-Hsiang

    المساهمون: 胡毓忠, Hu,Yuh­-Jong

    وصف الملف: 3436463 bytes; application/pdf

    Relation: [1] Nic Newman, Richard Fletcher, and David A. L. Levy, et al. digital-news­report­2016. Digital Journalism. https://reutersinstitute.politics.ox.ac.uk/\nour-research/digital-news-report-2016, 2016.\n[2] Edson C., Tandoc Jr., and Zheng Wei Lim, et al. Defining fake news. Digital Jour-nalism. https://doi.org/10.1080/21670811.2017.1360143, 2018.\n[3] Ashish Vaswani, Noam M. Shazeer, and Niki Parmar, et al. Attention is all you need.\narXiv preprint arXiv:1706.03762, 2017.\n[4] Jacob Devlin, Ming­Wei Chang, and Kenton Lee, et al. Bert: Pre­training of deep bidirectional transformers for language understanding. arXiv preprint\narXiv:1810.04805, 2019.\n[5] Haoming Guo, Tianyi Huan, and Huixuan Huang, et al. Detecting covid­19 conspir-acy theories with transformers and tf­idf. arXiv preprint arXiv:2205.00377, 2022.\n[6] Jin Di, Jin Zhijing, and Zhou Joey Tianyi, et al. Is bert really robust? natural language attack on text classification and entailment. arXiv preprint arXiv:1907.11932, 2019.\n[7] Shilin Qiu, Qihe Liu, and Shijie Zhou, et al. Adversarial attack and defense tech-nologies in natural language processing: A survey. Neurocomputing, 2022.\n[8] Ji Gao, Jack Lanchantin, and Mary Lou Soffa, et al. Black­box generation of adver-sarial text sequences to evade deep learning classifiers. In 2018 IEEE Security and\nPrivacy Workshops (SPW). IEEE, 2018.\n[9] Robin Jia, Percy Liang. Adversarial examples for evaluating reading comprehension systems. arXiv preprint arXiv:1707.07328, 2017.\n[10] Zhihong Shao, Zitao Liu, and Jiyong Zhang, et al. Advexpander: Generating natu-ral language adversarial examples by expanding text. IEEE/ACM Transactions on\nAudio, Speech, and Language Processing, 2022.\n[11] Daniel Matthew Cer, Yinfei Yang, and Sheng­yi Kong, et al. Universal sentence encoder. arXiv preprint arXiv:1803.11175, 2018.\n[12] Mein Gunnar, Hartman Kevin, Morris Andrew. Firebert: Hardening bert­based clas-sifiers against adversarial attack. arXiv preprint arXiv:2008.04203, 2020.\n[13] Page Lawrence, Brin Sergey, and Motwani Rajeev, et al. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab, 1999.\n[14] Mihalcea Rada, Tarau Paul. Textrank: Bringing order into text. In Proceedings of the 2004 conference on empirical methods in natural language processing, 2004.\n[15] Grootendorst, Maarten. Keybert: Minimal keyword extraction with bert. [Internet].\nAvailable: https://maartengr. github. io/KeyBERT/index. html, 2020.\n[16] Nikola Mrksic, Diarmuid Ó Séaghdha, and Blaise Thomson, et al. Counter­fitting word vectors to linguistic constraints. In NAACL, 2016.; G0106971008; https://nccur.lib.nccu.edu.tw//handle/140.119/141837; https://nccur.lib.nccu.edu.tw/bitstream/140.119/141837/1/100801.pdf

  10. 10
    Dissertation/ Thesis

    المؤلفون: Jayhne, Mukkul I

    المساهمون: Wang, Xuyu, Ouyang, Jinsong

    المصدر: oai:alma.01CALS_USL:11242312150001671

  11. 11