DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 177
1.
  • Enhance PATE on Complex Tas... Enhance PATE on Complex Tasks With Knowledge Transferred From Non-Private Data
    Wang, Lulu; Zheng, Junxiang; Cao, Yongzhi ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Privacy protection is considered as an important problem in learning-based systems. Recently, various works based on differential privacy have been proposed to protect an individual's privacy in the ...
Full text
Available for: UL

PDF
2.
  • Resisting membership infere... Resisting membership inference attacks through knowledge distillation
    Zheng, Junxiang; Cao, Yongzhi; Wang, Hanpin Neurocomputing (Amsterdam), 09/2021, Volume: 452
    Journal Article
    Peer reviewed

    Recently, membership inference attacks (MIAs) against machine learning models have been proposed. Using MIAs, adversaries can inference whether a data record is in the training set of the target ...
Full text
Available for: UL
3.
  • An intelligent operation ti... An intelligent operation ticket check method of power grid dispatch based on semantic analysis
    ZHENG Junxiang; LI Huile; HUANG Datie ... Zhejiang Dianli, 10/2022, Volume: 41, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    For automatic and intelligent check of operation ticket for power grid scheduling, a scheduling operation ticket checking and analysis method based on bidirectional GRU (gated recurrent unit) neural ...
Full text
Available for: UL
4.
  • 基于语义分析的电网调度操作票智能校核方法 基于语义分析的电网调度操作票智能校核方法
    郑俊翔; 刘辉乐; 黄达铁 ... 浙江电力, 10/2022, Volume: 41, Issue: 10
    Journal Article
    Peer reviewed

    为实现电网调度操作票的自动智能校核,提出了一种基于双向GRU(门控循环单元)神经网络和多种校验规则的调度操作票审核分析方法.将基于双向GRU神经网络的语义分析技术与智能审核方法相结合,对调度指令和检修申请单文本进行数据预处理,将安全措施状态与操作票设备最终状态对比.在智能规则校核环节依次进行格式校核、逻辑校核、安全校核,最后将票面错误异常进行输出.利用浙江电力停电智能管控系统中的历史调度操作票对所提方法进行测试,结果表明该方法提高了审核的安全性和工作效率,实现了电网调度操作票的智能效核.
Full text
Available for: UL
5.
  • Sample Essentiality and Its... Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs
    Zhu, Siwen; Tang, Yi; Zheng, Junxiang ... ACM transactions on embedded computing systems, 10/2019, Volume: 18, Issue: 5
    Journal Article
    Peer reviewed

    Physically Unclonable Functions (PUFs), as an alternative hardware-based security method, have been challenged by some modeling attacks. As is known to all, samples are significant in modeling ...
Full text
Available for: UL
6.
  • 基于语义分析的设备监控告警信息知识图谱构建研究 基于语义分析的设备监控告警信息知识图谱构建研究
    施正钗; 郑俊翔; 周泰斌 ... 浙江电力, 2020, Volume: 39, Issue: 8
    Journal Article
    Peer reviewed

    TM734; ...
Full text
Available for: UL
7.
  • 基于BiLSTM-Attention的电网告警信息缺陷... 基于BiLSTM-Attention的电网告警信息缺陷风险预警
    郑俊翔; 施正钗; 周泰斌 ... 浙江电力, 2021, Volume: 40, Issue: 8
    Journal Article
    Peer reviewed

    TM732; ...
Full text
Available for: UL
8.
  • A Secure Internet-Based Per... A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition
    Xuan, Guorong; Zheng, Junxiang; Yang, Chengyun ... Digital Watermarking
    Book Chapter
    Peer reviewed

    This paper proposes an internet-based personal identity verification system using lossless data hiding and fingerprint recognition technologies. At the client side, the SHA-256 hash of the original ...
Full text
9.
  • High capacity lossless data... High capacity lossless data hiding based on integer wavelet transform
    Guorong Xuan; Shi, Y.Q.; Ni, Z.C. ... 2004 IEEE International Symposium on Circuits and Systems (ISCAS), 2004, Volume: 2
    Conference Proceeding

    This paper proposes a novel approach to high capacity lossless data hiding based on integer wavelet transform, which embeds high capacity data into the most insensitive bit-planes of wavelet ...
Full text
Available for: UL
10.
Full text
Available for: UL
1 2 3 4 5
hits: 177

Load filters