Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Shao, Qiqi"'
Publikováno v:
Zhongguo quanke yixue, Vol 28, Iss 03, Pp 299-304 (2025)
Background Remnant cholesterol (RC) is considered a significant risk factor for atherosclerotic cardiovascular diseases, and the progression of non-culprit coronary lesions (NCCLs) is also a prominent issue affecting the prognosis of patients with co
Externí odkaz:
https://doaj.org/article/6a4f21ea06544086927e5e0381040e22
Autor:
Wang, Dong, Guo, Jia, Shao, Qiqi, He, Haochi, Chen, Zhian, Xiao, Chuanbao, Liu, Ajian, Escalera, Sergio, Escalante, Hugo Jair, Lei, Zhen, Wan, Jun, Deng, Jiankang
Face anti-spoofing (FAS) is an essential mechanism for safeguarding the integrity of automated face recognition systems. Despite substantial advancements, the generalization of existing approaches to real-world applications remains challenging. This
Externí odkaz:
http://arxiv.org/abs/2304.05753
Autor:
You, Haolan, Song, Yihe, Yang, Yi, Wang, Xicheng, Pan, Shiqi, Huang, Junyang, Shao, Qiqi, Shi, Donglei, Li, Baoli, Li, Jian, Li, Xiaokang
Publikováno v:
In European Journal of Medicinal Chemistry 15 November 2024 278
Autor:
Song, Jiamei, Li, Ruoxi, Huang, Zhenghui, Qian, Yunan, Wang, Xicheng, Shao, Qiqi, Mao, Fei, Wang, Manjiong, Jiang, Lubin, Li, Jian, Li, Xiaokang
Publikováno v:
In Bioorganic & Medicinal Chemistry 1 December 2024 115
Autor:
Qian, Yaguan, Shao, Qiqi, Yao, Tengteng, Wang, Bin, Ji, Shouling, Zeng, Shaoning, Gu, Zhaoquan, Swaileh, Wassim
Adversarial training is wildly considered as one of the most effective way to defend against adversarial examples. However, existing adversarial training methods consume unbearable time, due to the fact that they need to generate adversarial examples
Externí odkaz:
http://arxiv.org/abs/2102.00662
Autor:
Qian, Yaguan, Shao, Qiqi, Wang, Jiamin, Lin, Xiang, Guo, Yankai, Gu, Zhaoquan, Wang, Bin, Wu, Chunming
With the boom of edge intelligence, its vulnerability to adversarial attacks becomes an urgent problem. The so-called adversarial example can fool a deep learning model on the edge node to misclassify. Due to the property of transferability, the adve
Externí odkaz:
http://arxiv.org/abs/2009.10537
Autor:
Shao, Qiqi, Zhang, Yanan, Liu, Yanlei, Shang, Yongliang, Li, Si, Liu, Lin, Wang, Guoqiang, Zhou, Xu, Wang, Ping, Gao, Jinmin, Zhou, Jun, Zhang, Liangran, Wang, Shunxin
Publikováno v:
In Cell Reports 29 August 2023 42(8)
Autor:
Yu, Lingjuan1 (AUTHOR) yulingjuan@jxust.edu.cn, Shao, Qiqi1 (AUTHOR), Guo, Yuting1 (AUTHOR), Xie, Xiaochun2 (AUTHOR), Liang, Miaomiao1 (AUTHOR), Hong, Wen3 (AUTHOR)
Publikováno v:
Remote Sensing. Mar2023, Vol. 15 Issue 5, p1371. 22p.
Publikováno v:
网络与信息安全学报, Vol 7, Iss 1, Pp 113-120 (2021)
Deep neural network has been successfully applied to image classification, but recent research work shows that deep neural network is vulnerable to adversarial attacks. A moving target defense method was proposed by means of dynamic switching model w
Externí odkaz:
https://doaj.org/article/a32aa21a89434478a272f05400212da0
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.