• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4698277)   Today's Articles (542)
For: Yang E, Liu T, Deng C, Tao D. Adversarial Examples for Hamming Space Search. IEEE Trans Cybern 2020;50:1473-1484. [PMID: 30561358 DOI: 10.1109/tcyb.2018.2882908] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
Number Cited by Other Article(s)
1
Xi Z, Qu Z, Lu W, Luo X, Cao X. Invisible DNN Watermarking Against Model Extraction Attack. IEEE TRANSACTIONS ON CYBERNETICS 2024;PP:800-811. [PMID: 40030655 DOI: 10.1109/tcyb.2024.3514838] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/05/2025]
2
Yang E, Deng C, Liu M. Deep Bayesian Quantization for Supervised Neuroimage Search. MACHINE LEARNING IN MEDICAL IMAGING. MLMI (WORKSHOP) 2023;14349:396-406. [PMID: 38390519 PMCID: PMC10883338 DOI: 10.1007/978-3-031-45676-3_40] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/24/2024]
3
Xu Q, Yang Z, Zhao Y, Cao X, Huang Q. Rethinking Label Flipping Attack: From Sample Masking to Sample Thresholding. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2023;45:7668-7685. [PMID: 37819793 DOI: 10.1109/tpami.2022.3220849] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/13/2023]
4
Hu P, Zhu H, Lin J, Peng D, Zhao YP, Peng X. Unsupervised Contrastive Cross-Modal Hashing. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2023;45:3877-3889. [PMID: 35617190 DOI: 10.1109/tpami.2022.3177356] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/15/2023]
5
Chen B, Feng Y, Dai T, Bai J, Jiang Y, Xia ST, Wang X. Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2023;45:1388-1404. [PMID: 35380957 DOI: 10.1109/tpami.2022.3165024] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
6
U-Turn: Crafting Adversarial Queries with Opposite-Direction Features. Int J Comput Vis 2022. [DOI: 10.1007/s11263-022-01737-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
7
Chen Y, Gao R, Liu F, Zhao D. ModuleNet: Knowledge-Inherited Neural Architecture Search. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:11661-11671. [PMID: 34097629 DOI: 10.1109/tcyb.2021.3078573] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
8
Zhu L, Wang T, Li J, Zhang Z, Shen J, Wang X. Efficient Query-based Black-Box Attack against Cross-modal Hashing Retrieval. ACM T INFORM SYST 2022. [DOI: 10.1145/3559758] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/01/2022]
9
Qu X, Ong YS, Gupta A. Frame-Correlation Transfers Trigger Economical Attacks on Deep Reinforcement Learning Policies. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:7577-7590. [PMID: 33417576 DOI: 10.1109/tcyb.2020.3041265] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
10
A Fast Method for Protecting Users’ Privacy in Image Hash Retrieval System. MACHINES 2022. [DOI: 10.3390/machines10040278] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
11
Du T, Ji S, Wang B, He S, Li J, Li B, Wei T, Jia Y, Beyah R, Wang T. D etect S ec : Evaluating the robustness of object detection models to adversarial attacks. INT J INTELL SYST 2022. [DOI: 10.1002/int.22851] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
12
Hu P, Peng X, Zhu H, Lin J, Zhen L, Peng D. Joint Versus Independent Multiview Hashing for Cross-View Retrieval. IEEE TRANSACTIONS ON CYBERNETICS 2021;51:4982-4993. [PMID: 33119532 DOI: 10.1109/tcyb.2020.3027614] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
13
Quadruplet-Based Deep Cross-Modal Hashing. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2021;2021:9968716. [PMID: 34306059 PMCID: PMC8270718 DOI: 10.1155/2021/9968716] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/18/2021] [Revised: 05/24/2021] [Accepted: 06/14/2021] [Indexed: 12/02/2022]
14
Ai S, Voundi Koe AS, Huang T. Adversarial perturbation in remote sensing image recognition. Appl Soft Comput 2021. [DOI: 10.1016/j.asoc.2021.107252] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
15
Wang D, Li C, Wen S, Han QL, Nepal S, Zhang X, Xiang Y. Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE TRANSACTIONS ON CYBERNETICS 2021;PP:7427-7440. [PMID: 33400667 DOI: 10.1109/tcyb.2020.3041481] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
16
Xu X, Wang T, Yang Y, Zuo L, Shen F, Shen HT. Cross-Modal Attention With Semantic Consistence for Image-Text Matching. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2020;31:5412-5425. [PMID: 32071004 DOI: 10.1109/tnnls.2020.2967597] [Citation(s) in RCA: 28] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
17
Deng C, Yang E, Liu T, Tao D. Two-Stream Deep Hashing With Class-Specific Centers for Supervised Image Search. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2020;31:2189-2201. [PMID: 31514156 DOI: 10.1109/tnnls.2019.2929068] [Citation(s) in RCA: 27] [Impact Index Per Article: 5.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
18
Xie D, Deng C, Li C, Liu X, Tao D. Multi-Task Consistency-Preserving Adversarial Hashing for Cross-Modal Retrieval. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2020;29:3626-3637. [PMID: 31940536 DOI: 10.1109/tip.2020.2963957] [Citation(s) in RCA: 20] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
19
Deng C, Yang E, Liu T, Li J, Liu W, Tao D. Unsupervised Semantic-Preserving Adversarial Hashing for Image Search. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2019;28:4032-4044. [PMID: 30872226 DOI: 10.1109/tip.2019.2903661] [Citation(s) in RCA: 41] [Impact Index Per Article: 6.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA