Zobrazeno 1 - 10
of 107
pro vyhledávání: '"Peng, Yuefeng"'
Despite significant advancements, large language models (LLMs) still struggle with providing accurate answers when lacking domain-specific or up-to-date knowledge. Retrieval-Augmented Generation (RAG) addresses this limitation by incorporating extern
Externí odkaz:
http://arxiv.org/abs/2411.01705
We introduce One-Shot Label-Only (OSLO) membership inference attacks (MIAs), which accurately infer a given sample's membership in a target model's training set with high precision using just \emph{a single query}, where the target model only returns
Externí odkaz:
http://arxiv.org/abs/2405.16978
Deep learning models, while achieving remarkable performances, are vulnerable to membership inference attacks (MIAs). Although various defenses have been proposed, there is still substantial room for improvement in the privacy-utility trade-off. In t
Externí odkaz:
http://arxiv.org/abs/2312.04692
Deep neural networks (DNNs) are threatened by adversarial examples. Adversarial detection, which distinguishes adversarial images from benign images, is fundamental for robust DNN-based services. Image transformation is one of the most effective appr
Externí odkaz:
http://arxiv.org/abs/2201.01080
Deep neural networks (DNNs) are under threat from adversarial example attacks. The adversary can easily change the outputs of DNNs by adding small well-designed perturbations to inputs. Adversarial example detection is a fundamental work for robust D
Externí odkaz:
http://arxiv.org/abs/2107.09502
Autor:
Huang, Qingsheng, Peng, Yin, Peng, Yuefeng, Lin, Huijuan, Deng, Shiqi, Feng, Shengzhong, Wei, Yanjie
Publikováno v:
In Methods April 2024 224:35-46
Publikováno v:
Jisuanji kexue, Vol 50, Iss 3, Pp 351-359 (2023)
In recent years,machine learning has not only achieved remarkable results in conventional fields such as computer vision and natural language processing,but also been widely applied to process sensitive data such as face images,financial data and med
Externí odkaz:
https://doaj.org/article/e9e2bbabddcd4ab4897b3b6bff2f0ad6
Publikováno v:
In Applied Soft Computing Journal July 2022 124
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.