BLACK-BOX

作品数:43被引量:36H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张象刚更多>>
相关机构:湖南大学成都建筑材料工业设计研究院清华大学更多>>
相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Journal of Clinical & Translational Research》《国际计算机前沿大会会议论文集》《Chinese Journal of Electronics》更多>>
相关基金:国家自然科学基金中国航空科学基金The Royal Society国家重点基础研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Predicting outcomes using neural networks in the intensive care unit
《World Journal of Clinical Cases》2025年第11期1-11,共11页Gumpeny R Sridhar Venkat Yarabati Lakshmi Gumpeny 
Patients in intensive care units(ICUs)require rapid critical decision making.Modern ICUs are data rich,where information streams from diverse sources.Machine learning(ML)and neural networks(NN)can leverage the rich da...
关键词:Large language models HALLUCINATIONS Supervised learning Unsupervised learning Convoluted neural networks BLACK-BOX WORKFLOW 
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
《Computers, Materials & Continua》2025年第4期157-175,共19页Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang 
supported by the Intelligent Policing Key Laboratory of Sichuan Province(No.ZNJW2022KFZD002);This work was supported by the Scientific and Technological Research Program of Chongqing Municipal Education Commission(Grant Nos.KJQN202302403,KJQN202303111).
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior knowledge.This is achieved by leveraging the property of adversarial examples.That is,when generated from a surrogate model,they re...
关键词:Adversarial examples black-box transferability regularized constrained transfer-based adversarial attacks 
Optimizing BERT for Bengali Emotion Classification: Evaluating Knowledge Distillation, Pruning, and Quantization
《Computer Modeling in Engineering & Sciences》2025年第2期1637-1666,共30页Md Hasibur Rahman Mohammed Arif Uddin Zinnat Fowzia Ria Rashedur M.Rahman 
The rapid growth of digital data necessitates advanced natural language processing(NLP)models like BERT(Bidi-rectional Encoder Representations from Transformers),known for its superior performance in text classificati...
关键词:Bengali NLP black-box distillation emotion classification model compression post-training quantization unstructured pruning 
MSLFuzzer:black-box fuzzing of SOHO router devices via message segment list inference
《Cybersecurity》2024年第4期89-109,共21页Yixuan Cheng Wenqing Fan Wei Huang Jingyu Yang Gaoqing Yu Wen Liu 
supported by the major project of Science and Technology Innovation 2030,"The next generation of Artificial Intelligence"under Grant Number 2021ZD0111400;the Open project of the State Key Laboratory of Computer Architecture,Neural Network Enhanced Symbolic Execution Algorithm Research under Grant Number CARCH201910;the Fundamental Research Fundsfor the Central Universities under Grant Number 3132018XNG1814 and 3132018XNG1815.
The popularity of small office and home office routers has brought convenience,but it also caused many security issues due to vulnerabilities.Black-box fuzzing through network protocols to discover vulnerabilities bec...
关键词:Vulnerability discovery Black-box fuzzing SOHO routers Feedback mechanism 
An efficient binary programming method for black-box optimization and its application in processor design
《Science China(Information Sciences)》2024年第12期136-152,共17页Xiaoliang LV Qiaozhu ZHAI Jianchen HU Yuhang ZHU Jinhui LIU Xiaohong GUAN 
supported by Hisilicon Huawei。
Optimizing the parameter settings in a large design space for the processor with limited simulation resources is a challenging task. The current black-box optimization algorithms for processor design space exploration...
关键词:black-box optimization binary programming design space exploration processor design expensive simulation system 
Committed-programming reductions:formalizations,implications and relations
《Science China(Information Sciences)》2024年第10期147-167,共21页Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG 
supported by National Natural Science Foundation of China(Grant Nos.62022018,61932019);supported by National Natural Science Foundation of China(Grant Nos.62125204,92270201);National Key Research and Development Program of China(Grant No.2022YFB2702000);National Key Research and Development Program of China(Grant No.2018YFA0704701);Major Program of Guangdong Basic and Applied Research(Grant No.2019B030302008);the support from the XPLORER PRIZE。
In this work,we introduce a class of black-box(BB)reductions called committed-programming reduction(CPRed)in the random oracle model(ROM)and obtain the following interesting results:(1)we demonstrate that some well-kn...
关键词:provable security random oracle model quantum random oracle model black-box reduction/separation PROGRAMMABILITY 
KubeFuzzer:Automating RESTful API Vulnerability Detection in Kubernetes
《Computers, Materials & Continua》2024年第10期1595-1612,共18页Tao Zheng Rui Tang Xingshu Chen Changxiang Shen 
supported by the National Natural Science Foundation of China(No.62202320);the Fundamental Research Funds for the Central Universities(Nos.SCU2023D008,2023SCU12129);the Natural Science Foundation of Sichuan Province(No.2024NSFSC1449);the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129);the Key Laboratory of Data Protection and Intelligent Management(Sichuan University),Ministry of Education.
RESTful API fuzzing is a promising method for automated vulnerability detection in Kubernetes platforms.Existing tools struggle with generating lengthy,high-semantic request sequences that can pass Kubernetes API gate...
关键词:Kubernetes RESTful APIs API fuzzing black-box fuzzing 
Attack based on data: a novel perspective to attack sensitive points directly
《Cybersecurity》2024年第3期111-123,共13页Yuyao Ge Zhongguo Yang Lizhe Chen Yiming Wang Chengyang Li 
This work is supported by the Key Program of National Natural Science Foundation of China(No.61832004);International Cooperation and Exchange Program of National Natural Science Foundation of China(Grant no.62061136006).
Adversarial attack for time-series classification model is widely explored and many attack methods are proposed.But there is not a method of attack based on the data itself.In this paper,we innovatively proposed a bla...
关键词:Black-box adversarial attack Time series classification Data mining 
Black-box membership inference attacks based on shadow model
《The Journal of China Universities of Posts and Telecommunications》2024年第4期1-16,共16页Han Zhen Zhou Wen'an Han Xiaoxuan Wu Jie 
Membership inference attacks on machine learning models have drawn significant attention.While current research primarily utilizes shadow modeling techniques,which require knowledge of the target model and training da...
关键词:machine learning membership inference attack shadow model black-box model 
Dynamic Equivalent Modeling for Black-box Microgrids Under Multi-operating-point by Using LSTM被引量:2
《CSEE Journal of Power and Energy Systems》2024年第2期639-648,共10页Yunlu Li Josep M.Guerrero Junyou Yang Yajuan Guan Guiqing Ma Jiawei Feng 
supported in part by the Science Search Foundation of Liaoning Educational Department(No.LQGD2020002).
Since the high penetration of distributed energy sources complicates the dynamics of electrical power systems,accurate dynamic models are indispensable for study on the transient behavior of the microgrid(MG).In some ...
关键词:Deep learning dynamic behavior dynamic equivalent model MICROGRID neural network 
检索报告 对象比较 聚类工具 使用帮助 返回顶部