UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Adversarial example generation with adaptive gradient search for single and ensemble deep neural network Journal article
Information Sciences, 2020,Volume: 528,Page: 147-167
Authors:  Xiao,Yatie;  Pun,Chi Man;  Liu,Bo
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2021/03/11
Adaptive gradient  Adversarial attack  Deep neural networks  Perturbation  
Crafting adversarial example with adaptive root mean square gradient on deep neural networks Journal article
Neurocomputing, 2020,Volume: 389,Page: 179-195
Authors:  Xiao,Yatie;  Pun,Chi Man;  Liu,Bo
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/03/11
Adaptive gradient  Adversarial example  Perturbation  Root mean square  
Generating Adversarial Perturbation with Root Mean Square Gradient Conference paper
Proceedings of AAAI Workshops, 2019., Honolulu, Hawaii, USA, 2019-1-28
Authors:  Xiao, Yatie;  Pun, Chi-Man;  Zhou, Jiezhe
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/05/21
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack