找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Attacks, Defenses and Testing for Deep Learning; Jinyin Chen,Ximin Zhang,Haibin Zheng Book 2024 The Editor(s) (if applicable) and The Auth

[复制链接]
楼主: risky-drinking
发表于 2025-3-28 15:43:27 | 显示全部楼层
Adversarial Attacks on GNN-Based Vertical Federated Learningon the noise-enhanced global node embeddings, leveraging privacy leakage and the gradient of pairwise nodes. Our approach begins by stealing the global node embeddings and constructing a shadow model of the server for the attack generator. Next, we introduce noise into the node embeddings to confuse
发表于 2025-3-28 19:17:09 | 显示全部楼层
发表于 2025-3-29 01:13:38 | 显示全部楼层
Query-Efficient Adversarial Attack Against Vertical Federated Graph Learningd using the manipulated data to imitate the behavior of the server model in VFGL. Consequently, the shadow model can significantly boost the success rate of centralized attacks with minimal queries. Multiple tests conducted on four real-world benchmarks show that our method can enhance the performan
发表于 2025-3-29 06:56:17 | 显示全部楼层
发表于 2025-3-29 09:21:32 | 显示全部楼层
Backdoor Attack on Dynamic Link Predictionet. This process helps reduce the size of the triggers and enhances the concealment of the attack. Experimental results demonstrate that our method successfully launches backdoor attacks on several state-of-the-art DLP models, achieving a success rate exceeding 90%.
发表于 2025-3-29 15:06:32 | 显示全部楼层
Attention Mechanism-Based Adversarial Attack Against DRLdversarial state. DQN is one of the state-of-the-art DRL models and is used as the target model to train the Flappybird gaming environment to assure continuous operation and high success rates. We performed comprehensive attack experiments on DQN and examined its attack performance in terms of rewar
发表于 2025-3-29 17:46:55 | 显示全部楼层
发表于 2025-3-29 20:14:56 | 显示全部楼层
发表于 2025-3-30 03:14:53 | 显示全部楼层
发表于 2025-3-30 07:26:08 | 显示全部楼层
Adaptive Channel Transformation-Based Detector for Adversarial Attacksn instances but also can recognize the types of attacks, such as white-box attacks and black-box attacks. In order to validate the detection efficiency of our method, we conduct comprehensive experiments on MNIST, CIFAR10, and ImageNet datasets. With 99.05% and 98.8% detection rates on the MNIST and
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-16 22:35
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表