34 results on '"Can He"'
Search Results
2. Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
3. Evaluation of Three Land Surface Temperature Products From Landsat Series Using in Situ Measurements.
4. ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
5. Enhancing fusarium head blight detection in wheat crops using hyperspectral indices and machine learning classifiers.
6. One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models.
7. Reliability assessment of a multi-state distribution network under cost and spoilage considerations.
8. FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations.
9. Customized Instruction on RISC-V for Winograd-Based Convolution Acceleration.
10. Robust Backdoor Attacks against Deep Neural Networks in Real Physical World.
11. Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
12. Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems.
13. Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems.
14. A framework combined stacking ensemble algorithm to classify crop in complex agricultural landscape of high altitude regions with Gaofen-6 imagery and elevation data.
15. A Minimal Path-Based Method for Computing Multistate Network Reliability.
16. Capacity Reliability Calculation and Sensitivity Analysis for a Stochastic Transport Network.
17. ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples.
18. Robust Backdoor Attacks against Deep Neural Networks in Real Physical World.
19. PTB: Robust physical backdoor attacks against deep neural networks in real world.
20. Evaluation of Diverse Convolutional Neural Networks and Training Strategies for Wheat Leaf Disease Identification with Field-Acquired Photographs.
21. Clustering Analysis Based on Segmented Images.
22. DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations.
23. Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
24. Robust and Natural Physical Adversarial Examples for Object Detectors.
25. SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images.
26. 3D Invisible Cloak.
27. A Particle Swarm Optimization Technique-Based Parametric Wavelet Thresholding Function for Signal Denoising.
28. A New Image Decomposition and Reconstruction Approach - Adaptive Fourier Decomposition.
29. SocialGuard: An adversarial example based privacy-preserving technique for social images.
30. NaturalAE: Natural and robust physical adversarial examples for object detectors.
31. LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system.
32. Hybrid detector set: detectors with different affinity.
33. A new uniform neuron model of generalized logic operators based on [a, b].
34. A Combined Optimal Sensor Placement Strategy for the Structural Health Monitoring of Bridge Structures.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.