Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cfa: Class-wise calibrated fair adversarial training
Adversarial training has been widely acknowledged as the most effective method to improve
the adversarial robustness against adversarial examples for Deep Neural Networks (DNNs) …
the adversarial robustness against adversarial examples for Deep Neural Networks (DNNs) …
Reliable adversarial distillation with unreliable teachers
J Zhu, J Yao, B Han, J Zhang, T Liu, G Niu… - ar**, Q Wang… - Advances in Neural …, 2023 - proceedings.neurips.cc
Abstract Adversarial Robustness Distillation (ARD) aims to transfer the robustness of large
teacher models to small student models, facilitating the attainment of robust performance on …
teacher models to small student models, facilitating the attainment of robust performance on …
Closer look at the transferability of adversarial examples: How they fool different models differently
Deep neural networks are vulnerable to adversarial examples (AEs), which have adversarial
transferability: AEs generated for the source model can mislead another (target) model's …
transferability: AEs generated for the source model can mislead another (target) model's …
Robust spatiotemporal traffic forecasting with reinforced dynamic adversarial training
Machine learning-based forecasting models are commonly used in Intelligent Transportation
Systems (ITS) to predict traffic patterns and provide city-wide services. However, most of the …
Systems (ITS) to predict traffic patterns and provide city-wide services. However, most of the …
Why do we click: visual impression-aware news recommendation
There is a soaring interest in the news recommendation research scenario due to the
information overload. To accurately capture users' interests, we propose to model multi …
information overload. To accurately capture users' interests, we propose to model multi …
A unified game-theoretic interpretation of adversarial robustness
This paper provides a unified view to explain different adversarial attacks and defense
methods, ie the view of multi-order interactions between input variables of DNNs. Based on …
methods, ie the view of multi-order interactions between input variables of DNNs. Based on …