Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial machine learning in image classification: A survey toward the defender's perspective
GR Machado, E Silva, RR Goldschmidt - ACM Computing Surveys …, 2021 - dl.acm.org
Deep Learning algorithms have achieved state-of-the-art performance for Image
Classification. For this reason, they have been used even in security-critical applications …
Classification. For this reason, they have been used even in security-critical applications …
How deep learning sees the world: A survey on adversarial attacks & defenses
Deep Learning is currently used to perform multiple tasks, such as object recognition, face
recognition, and natural language processing. However, Deep Neural Networks (DNNs) are …
recognition, and natural language processing. However, Deep Neural Networks (DNNs) are …
Neural controlled differential equations for irregular time series
Neural ordinary differential equations are an attractive option for modelling temporal
dynamics. However, a fundamental issue is that the solution to an ordinary differential …
dynamics. However, a fundamental issue is that the solution to an ordinary differential …
Liquid structural state-space models
A proper parametrization of state transition matrices of linear state-space models (SSMs)
followed by standard nonlinearities enables them to efficiently learn representations from …
followed by standard nonlinearities enables them to efficiently learn representations from …
Liquid time-constant networks
We introduce a new class of time-continuous recurrent neural network models. Instead of
declaring a learning system's dynamics by implicit nonlinearities, we construct networks of …
declaring a learning system's dynamics by implicit nonlinearities, we construct networks of …
Simulation intelligence: Towards a new generation of scientific methods
The original" Seven Motifs" set forth a roadmap of essential methods for the field of scientific
computing, where a motif is an algorithmic method that captures a pattern of computation …
computing, where a motif is an algorithmic method that captures a pattern of computation …
Adversarial robustness in graph neural networks: A Hamiltonian approach
Graph neural networks (GNNs) are vulnerable to adversarial perturbations, including those
that affect both node features and graph topology. This paper investigates GNNs derived …
that affect both node features and graph topology. This paper investigates GNNs derived …
Dissecting neural odes
Continuous deep learning architectures have recently re-emerged as Neural Ordinary
Differential Equations (Neural ODEs). This infinite-depth approach theoretically bridges the …
Differential Equations (Neural ODEs). This infinite-depth approach theoretically bridges the …
Stable neural ode with lyapunov-stable equilibrium points for defending against adversarial attacks
Deep neural networks (DNNs) are well-known to be vulnerable to adversarial attacks, where
malicious human-imperceptible perturbations are included in the input to the deep network …
malicious human-imperceptible perturbations are included in the input to the deep network …
A neural network boosting regression model based on XGBoost
J Dong, Y Chen, B Yao, X Zhang, N Zeng - Applied Soft Computing, 2022 - Elsevier
The boosting model is a kind of ensemble learning technology, including XGBoost and
GBDT, which take decision trees as weak classifiers and achieve better results in …
GBDT, which take decision trees as weak classifiers and achieve better results in …