Page
%P
-
Chapter and Conference Paper
Searching for Textual Adversarial Examples with Learned Strategy
Adversarial attacks can help to reveal the vulnerability of neural networks. In the text classification domain, synonym replacement is an effective way to generate adversarial examples. However, the number of ...
-
Article
Data-Driven Granular Computing Systems and Applications
-
Chapter and Conference Paper
Design and Implementation of a Parallel Crypto Server
As demands for secure communication bandwidth grow, efficient processing of cryptographic server at the host has become a constraint that prevents the achievement of acceptable secure services at large e-comme...