Instinctive 发表于 2025-3-25 07:10:46

http://reply.papertrans.cn/47/4654/465367/465367_21.png

暂时休息 发表于 2025-3-25 08:39:54

DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformationrbation, namely DAS-AST. We evaluate the proposed defense against several state-of-the-art attack strategies, and compare the performance with other defense methods. The experiment results show that our defense is effective across a wide range of challenging datasets and performs better than the exi

无目标 发表于 2025-3-25 15:26:42

http://reply.papertrans.cn/47/4654/465367/465367_23.png

Carbon-Monoxide 发表于 2025-3-25 19:10:15

http://reply.papertrans.cn/47/4654/465367/465367_24.png

EVICT 发表于 2025-3-26 00:00:33

http://reply.papertrans.cn/47/4654/465367/465367_25.png

不愿 发表于 2025-3-26 03:04:29

http://reply.papertrans.cn/47/4654/465367/465367_26.png

intricacy 发表于 2025-3-26 06:26:17

http://reply.papertrans.cn/47/4654/465367/465367_27.png

dagger 发表于 2025-3-26 09:32:45

http://reply.papertrans.cn/47/4654/465367/465367_28.png

Deduct 发表于 2025-3-26 13:41:39

http://reply.papertrans.cn/47/4654/465367/465367_29.png

Dictation 发表于 2025-3-26 16:49:02

http://reply.papertrans.cn/47/4654/465367/465367_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology; 16th International C Yongdong Wu,Moti Yung Conference proceedings 2021 Springer Nature Switzerland AG