DEFENDING

作品数:43被引量:40H指数:3
导出分析报告
相关作者:史卓宋晓星傅翠娇郭海凤程天印更多>>
相关机构:湖南大学哈尔滨工业大学北京大学中国医学科学院肿瘤医院更多>>
相关期刊:更多>>
相关基金:国家自然科学基金河北省自然科学基金上海市自然科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning
《Computers, Materials & Continua》2025年第4期239-258,共20页Long Cai Ke Gu Jiaqi Lei 
supported in part by the National Social Science Foundation of China under Grant 20BTQ058;in part by the Natural Science Foundation of Hunan Province under Grant 2023JJ50033.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed training.Nonetheless,the open system architecture inherent to federated learning syst...
关键词:Federated learning malicious client detection model recovery machine unlearning 
东南大学白如帆在《Artificial Intelligence》上发表最新研究成果
《信息网络安全》2025年第3期402-402,共1页
近日,东南大学计算机与科学工程学院白如帆在人工智能领域国际期刊《Artificial Intelligence》(AIJ,CCF A)上发表题为“On the Computation of Mixed Strategies for Security Games with General Defending Requirements”的论文,介...
关键词:Mixed Strategies 智能体 安全博弈 Defending Requirements 
The symphony of maize signaling quartet defending against gray leaf spot
《Stress Biology》2024年第1期543-546,共4页Ping Wang Ping He 
support from the National Natural Science Foundation of China(32302370 to P.W.);USDA NIFA(grant 2020-67013-31615 to P.H.).
In plant immunity,a well-orchestrated cascade is initiated by the dimerization of receptor-like kinases(RLKs),followed by the phosphorylation of receptor-like cytoplasmic kinases(RLCKs)and subsequent activation of NAD...
关键词:Receptor-like kinases Receptor-like cytoplasmic kinases NADPH oxidase Grey leaf spot Pattern-triggered immunity 
Do Victims Defend Victims?The Mediating Role of Empathy between Victimization Experience and Public-Defending Tendency in School Bullying Situations
《International Journal of Mental Health Promotion》2024年第12期1033-1043,共11页Han Xie Yizhe Jiang Kunjie Cui 
supported by the Philosophy and Social Science Foundation of Hunan Province(Grant Number 21YBQ005).
Objectives:This study investigates the association between victimization experience and the tendency to defend on behalf of victims during school bullying incidents in public settings,with a focus on the mediating eff...
关键词:VICTIMIZATION EMPATHY defending tendency prosocial behavior school bullying left-behind children 
A Safer World for Children Defending children from the many dangers they face
《空中英语教室(中级版)》2024年第12期29-31,51,52,56,共6页Elizabeth Koroma 
All humans areborn small,weak and completely dependent on others,and it takes years for them to become self-reliant.This means that children rely on adultsto provide for them and protect them,and they face great dange...
关键词:CHILDREN THEY ADULT 
MaliFuzz:Adversarial Malware Detection Model for Defending Against Fuzzing Attack
《Journal of Beijing Institute of Technology》2024年第5期436-449,共14页Xianwei Gao Chun Shan Changzhen Hu 
With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade detection.It is generally difficult to explore the details of malware detection models,hackers c...
关键词:adversarial machine learning fuzzing attack malware detection 
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach被引量:1
《Digital Communications and Networks》2024年第3期716-727,共12页Muralitharan Krishnan Yongdo Lim Seethalakshmi Perumal Gayathri Palanisamy 
supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MEST)No.2015R1A3A2031159,2016R1A5A1008055.
Existing web-based security applications have failed in many situations due to the great intelligence of attackers.Among web applications,Cross-Site Scripting(XSS)is one of the dangerous assaults experienced while mod...
关键词:Machine learning Deep neural networks Classification Stacking ensemble XSS attack URL encoding JScript/JavaScript Web security 
Low-rank matrix recovery with total generalized variation for defending adversarial examples
《Frontiers of Information Technology & Electronic Engineering》2024年第3期432-445,共14页Wen LI Hengyou WANG Lianzhi HUO Qiang HE Linlin CHEN Zhiquan HE Wing W.Y.Ng 
Project supported by the National Natural Science Foundation of China(No.62072024);the Outstanding Youth Program of Beijing University of Civil Engineering and Architecture,China(No.JDJQ20220805);the Shenzhen Stability Support General Project(Type A),China(No.20200826104014001)。
Low-rank matrix decomposition with first-order total variation(TV)regularization exhibits excellent performance in exploration of image structure.Taking advantage of its excellent performance in image denoising,we app...
关键词:Total generalized variation Low-rank matrix Alternating direction method of multipliers Adversarial example 
VeriFace:Defending against Adversarial Attacks in Face Verification Systems
《Computers, Materials & Continua》2023年第9期3151-3166,共16页Awny Sayed Sohair Kinlany Alaa Zaki Ahmed Mahfouz 
funded by Institutional Fund Projects under Grant No.(IFPIP:329-611-1443);the technical and financial support provided by the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
Face verification systems are critical in a wide range of applications,such as security systems and biometric authentication.However,these systems are vulnerable to adversarial attacks,which can significantly compromi...
关键词:Adversarial attacks face aerification adversarial detection perturbation removal 
Defending Inalienable Right:Response to Three Critical Propositions
《The Journal of Human Rights》2023年第2期422-443,共22页赵树坤 余庆 CHANG Guohua 
a phased result of the important project“A Research of General Secretary Xi Jinping’s Important Statement on Respecting and Safeguarding Human Rights”(No.228ZD004);supported by National Social Science Fund of China;the SWUPL student scientific research innovation project of 2021(No.2021XZXS-070)。
To defend the explanatory power of the choice theory of rights,choice theorists have put forward the impossibility theorem,the proposition of moral priority,and the redundancy theory of rights to deny the existence of...
关键词:RIGHTS inalienable HOHFELD normative power 
检索报告 对象比较 聚类工具 使用帮助 返回顶部