Adversarial相关论文
Due to the increasing cyber-attacks,various Intrusion Detection Systems(IDSs)have been proposed to identify network anom......
The technique of facial attribute manipulation has found increasing application, but it remains challenging to restrict ......
We consider image transformation problems,and the objective is to translate images from a source domain to a target one.......
This work introduces an optimal transportation (OT) view of generative adversarial networks (GANs).Natural datasets have......
Energy consumption prediction of a CNC machining process is important for energy efficiency optimization strategies.To i......
计算机性能的提高和深度学习的出现,使得人工智能技术得到普遍应用,深度学习模型的安全性问题受到了广泛的关注.对抗样本的存在是......
Spatial landslide susceptibility assessment using machine learning techniques assisted by additional
In recent years,landslide susceptibility mapping has substantially improved with advances in machine learning.However,th......
Generative Adversarial Network-Based Electromagnetic Signal Classification: A Semi- Supervised Learn
Generative adversarial network(GAN)has achieved great success in many fields such as computer vision,speech processing,a......
随着深度学习技术的迅猛发展,卷积神经网络(Convolutional Neural Networks,CNN)在合成孔径雷达(Synthetic Aperture Radar,SAR)舰......
Generative adversarial networks (GANs) have become a competitive method among computer vision tasks. There have been man......
A sufficient sample size of monitoring data becomes a key factor for describing aircraft engines state.Generative advers......
Wasserstein GAN-Based Small-Sample Augmentation for New-Generation Artificial Intelligence: A Case S
It is essential to utilize deep-learning algorithms based on big data for the implementation of the new generation of ar......
Breast cancer is the most ordinary malignant tumor in women worldwide. Early breast cancer screening is the key to reduc......
Deep learning model is vulnerable to adversarial examples in the task of image classification. In this paper, a cluster-......
Haze is a very common phenomenon that degrades or reduces visibility. It causes various problems where high-quality imag......
With aperture synthesis(AS)technique,a number of small antennas can be assembled to form a large telescope whose spatial......
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to en......
Short Retraction Notice The authors claim that this paper needs modifications. This article has been retracted to straig......
In this paper we consider a parallel algorithm that detects the maximizer of unimodal function f(x) computable at every ......
Crowd counting is a challenging task in computer vision as realistic scenes are al?ways filled with unfavourable factors......
Owing to the wide range of applications in various fields,generative models have become increasingly popular.However,the......
Research on extraction and reproduction of deformation camouflage spot based on generative adversari
The method of describing deformation camouflage spots based on feature space has some shortcomings,such as inaccurate de......
Boundary equilibrium generative adversarial networks(BEGANs) are the improved version of generative adversarial networks......
Digital watermark embeds information bits into digital cover such as images and videos to prove the creator’s ownership......
This work introduces an optimal transportation(OT)view of generative adversarial networks(GANs).Natural datasets have in......
With the rapid developments of artificial intelligence(AI)and deep learning(DL)techniques,it is critical to ensure the s......
Multi-robot systems can be applied to patrol a concerned environment for security purposes.According to different goals,......