Deep search:Searching for "neural networks" in 'ABSTRACT and KEYWORDGot 108 items.
index Title
106Low-rank matrix recovery with total generalized variation for defending adversarial examples
Author(s):Wen LI, Hengyou WANG, Lianzhi HUO,...  Clicked:475  Download:349  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.432-445  DOI:10.1631/FITEE.2300017
107A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng ...  Clicked:6  Download:3  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2300867
108A geographic information encryption system based on chaos-LSTM and chaos sequence proliferation
Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO,...  Clicked:9  Download:2  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2300755
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE