期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Black⁃box adversarial attacks with imperceptible fake user profiles for recommender systems
1
作者 Qian Fulan Liu Jinggang +3 位作者 Chen Hai Chen Wenbin Zhao Shu Zhang Yanping 《南京大学学报(自然科学版)》 CSCD 北大核心 2024年第6期881-899,共19页
Attackers inject the designed adversarial sample into the target recommendation system to achieve illegal goals,seriously affecting the security and reliability of the recommendation system.It is difficult for attacke... Attackers inject the designed adversarial sample into the target recommendation system to achieve illegal goals,seriously affecting the security and reliability of the recommendation system.It is difficult for attackers to obtain detailed knowledge of the target model in actual scenarios,so using gradient optimization to generate adversarial samples in the local surrogate model has become an effective black‐box attack strategy.However,these methods suffer from gradients falling into local minima,limiting the transferability of the adversarial samples.This reduces the attack's effectiveness and often ignores the imperceptibility of the generated adversarial samples.To address these challenges,we propose a novel attack algorithm called PGMRS‐KL that combines pre‐gradient‐guided momentum gradient optimization strategy and fake user generation constrained by Kullback‐Leibler divergence.Specifically,the algorithm combines the accumulated gradient direction with the previous step's gradient direction to iteratively update the adversarial samples.It uses KL loss to minimize the distribution distance between fake and real user data,achieving high transferability and imperceptibility of the adversarial samples.Experimental results demonstrate the superiority of our approach over state‐of‐the‐art gradient‐based attack algorithms in terms of attack transferability and the generation of imperceptible fake user data. 展开更多
关键词 recommendation systems adversarial examples transferability imperceptible
在线阅读 下载PDF
“软件需求分析”实验教学研究与实践 被引量:8
2
作者 李尤丰 曾岳 《实验室研究与探索》 CAS 北大核心 2016年第4期228-231,246,共5页
以金陵科技学院软件工程学院"软件需求分析"课程实验教学开展为例,探讨该课程教育教学模式。该课程实验环境为USDM平台系统的"需求/设计管理工具";实验内容从项目的准备、启动、展开、定型、评审五个环节开展,各环... 以金陵科技学院软件工程学院"软件需求分析"课程实验教学开展为例,探讨该课程教育教学模式。该课程实验环境为USDM平台系统的"需求/设计管理工具";实验内容从项目的准备、启动、展开、定型、评审五个环节开展,各环节采用CMMI标准管理,量化考核。学生自行组队,提出Dirty Example,角色轮换,团队协力工作,课中讨论、评审,课后复查、修正,高质量完成文档。并配套实验教材,直观指导,过程化实验环节,提出知识能力与职业能力一体培养的工程教育模式。 展开更多
关键词 软件需求分析 实验教学 USDM CMMI Dirty example
在线阅读 下载PDF
Hazards:Maximizing Awareness,Minimizing Risks
3
作者 Francis Xavier Lukwiya 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期110-110,共1页
Hazards refer to situations with harmful effects on people’s lives,property,health and the environment. Examples include:fire outbreaks,hailstorms,smoke and haze,volcanic eruptions,earthquakes,landslides, drought,flo... Hazards refer to situations with harmful effects on people’s lives,property,health and the environment. Examples include:fire outbreaks,hailstorms,smoke and haze,volcanic eruptions,earthquakes,landslides, drought,floods,dust storm,global warming.Their remedies are:(1)sensitization of masses to take precaution;(2)resettlement of people based around hazardous areas;(3)instructing workers about the 展开更多
关键词 HAZARD risk REMEDY example
在线阅读 下载PDF
Validation method for simulation models with cross iteration
4
作者 FANG Ke ZHAO Kaibin ZHOU Yuchen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第3期555-563,共9页
Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In ord... Cross iteration often exists in the computational process of the simulation models, especially for control models. There is a credibility defect tracing problem in the validation of models with cross iteration. In order to resolve this problem, after the problem formulation, a validation theorem on the cross iteration is proposed, and the proof of the theorem is given under the cross iteration circumstance. Meanwhile, applying the proposed theorem, the credibility calculation algorithm is provided, and the solvent of the defect tracing is explained. Further, based on the validation theorem on the cross iteration, a validation method for simulation models with the cross iteration is proposed, which is illustrated by a flowchart step by step. Finally, a validation example of a sixdegree of freedom (DOF) flight vehicle model is provided, and the validation process is performed by using the validation method. The result analysis shows that the method is effective to obtain the credibility of the model and accomplish the defect tracing of the validation. 展开更多
关键词 VALIDATION METHOD simulation model CROSS ITERATION VALIDATION THEOREM VALIDATION example
在线阅读 下载PDF
AD7581模数转换器在8031单片机中的应用 被引量:1
5
作者 谢小杰 《基础自动化》 CSCD 1999年第4期25-27,48,共4页
介绍了 A D7581 模数转换器的主要技术参数和功能在以 8031 为核心的单片机系统中的应用实例, A/ D7581 具有智能化自动模/数转换功能,转换不占用系统 C P U 时间。应用该器件作为 A/ D 接口的单片机控制... 介绍了 A D7581 模数转换器的主要技术参数和功能在以 8031 为核心的单片机系统中的应用实例, A/ D7581 具有智能化自动模/数转换功能,转换不占用系统 C P U 时间。应用该器件作为 A/ D 接口的单片机控制系统可以大幅度提高性能,对 C P U 时间资源紧张的系统具有很高的实用价值。 展开更多
关键词 单片机 8031系列 模糊转换器 AD7581
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部