CN107808098A - 一种模型安全检测方法、装置以及电子设备 - Google Patents
一种模型安全检测方法、装置以及电子设备 Download PDFInfo
- Publication number
- CN107808098A CN107808098A CN201710798683.3A CN201710798683A CN107808098A CN 107808098 A CN107808098 A CN 107808098A CN 201710798683 A CN201710798683 A CN 201710798683A CN 107808098 A CN107808098 A CN 107808098A
- Authority
- CN
- China
- Prior art keywords
- result
- data
- model
- detected
- discriminator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 60
- 238000000034 method Methods 0.000 claims abstract description 60
- 238000012549 training Methods 0.000 claims abstract description 57
- 230000008569 process Effects 0.000 claims description 29
- 238000009826 distribution Methods 0.000 claims description 9
- 238000013136 deep learning model Methods 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 16
- 238000003860 storage Methods 0.000 description 13
- 238000004364 calculation method Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 10
- 230000006872 improvement Effects 0.000 description 9
- 239000013598 vector Substances 0.000 description 9
- 238000012545 processing Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000013528 artificial neural network Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000003062 neural network model Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000002349 favourable effect Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 238000012954 risk control Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012821 model calculation Methods 0.000 description 1
- 229920001296 polysiloxane Polymers 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3692—Test management for test results analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
- G06N20/10—Machine learning using kernel methods, e.g. support vector machines [SVM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
- G06N20/20—Ensemble learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/047—Probabilistic or stochastic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/06—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
- G06N3/063—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/088—Non-supervised learning, e.g. competitive learning
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- Molecular Biology (AREA)
- Medical Informatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Probability & Statistics with Applications (AREA)
- Neurology (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Image Analysis (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (19)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710798683.3A CN107808098B (zh) | 2017-09-07 | 2017-09-07 | 一种模型安全检测方法、装置以及电子设备 |
TW107117909A TWI712913B (zh) | 2017-09-07 | 2018-05-25 | 模型安全檢測方法、裝置以及電子設備 |
EP18854346.6A EP3608822B1 (en) | 2017-09-07 | 2018-09-03 | Method and apparatus for detecting model security and electronic device |
CA3062722A CA3062722A1 (en) | 2017-09-07 | 2018-09-03 | Method and apparatus for detecting model security and electronic device |
AU2018328515A AU2018328515C1 (en) | 2017-09-07 | 2018-09-03 | Method and apparatus for detecting model security and electronic device |
PCT/CN2018/103730 WO2019047795A1 (zh) | 2017-09-07 | 2018-09-03 | 一种模型安全检测方法、装置以及电子设备 |
US16/668,857 US10691794B2 (en) | 2017-09-07 | 2019-10-30 | Method, apparatus, and electronic device for detecting model security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710798683.3A CN107808098B (zh) | 2017-09-07 | 2017-09-07 | 一种模型安全检测方法、装置以及电子设备 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107808098A true CN107808098A (zh) | 2018-03-16 |
CN107808098B CN107808098B (zh) | 2020-08-21 |
Family
ID=61576552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710798683.3A Active CN107808098B (zh) | 2017-09-07 | 2017-09-07 | 一种模型安全检测方法、装置以及电子设备 |
Country Status (7)
Country | Link |
---|---|
US (1) | US10691794B2 (zh) |
EP (1) | EP3608822B1 (zh) |
CN (1) | CN107808098B (zh) |
AU (1) | AU2018328515C1 (zh) |
CA (1) | CA3062722A1 (zh) |
TW (1) | TWI712913B (zh) |
WO (1) | WO2019047795A1 (zh) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108667850A (zh) * | 2018-05-21 | 2018-10-16 | 济南浪潮高新科技投资发展有限公司 | 一种人工智能服务系统及其实现人工智能服务的方法 |
WO2019047795A1 (zh) * | 2017-09-07 | 2019-03-14 | 阿里巴巴集团控股有限公司 | 一种模型安全检测方法、装置以及电子设备 |
CN109543760A (zh) * | 2018-11-28 | 2019-03-29 | 上海交通大学 | 基于图像滤镜算法的对抗样本检测方法 |
CN109726800A (zh) * | 2018-12-29 | 2019-05-07 | 北京中科寒武纪科技有限公司 | 运算方法、装置及相关产品 |
CN110458662A (zh) * | 2019-08-06 | 2019-11-15 | 西安纸贵互联网科技有限公司 | 反欺诈风控方法及装置 |
CN110633989A (zh) * | 2019-08-16 | 2019-12-31 | 阿里巴巴集团控股有限公司 | 一种风险行为生成模型的确定方法及装置 |
CN111159776A (zh) * | 2019-12-24 | 2020-05-15 | 山东浪潮人工智能研究院有限公司 | 一种自适应神经网络模型验证方法及系统 |
CN111914256A (zh) * | 2020-07-17 | 2020-11-10 | 华中科技大学 | 一种机器学习训练数据受投毒攻击的防御方法 |
CN111949986A (zh) * | 2020-02-19 | 2020-11-17 | 华控清交信息科技(北京)有限公司 | 业务处理方法、系统及存储介质 |
CN111949972A (zh) * | 2020-02-19 | 2020-11-17 | 华控清交信息科技(北京)有限公司 | 人工智能模型的验证方法、系统、设备及存储介质 |
CN112313647A (zh) * | 2018-08-06 | 2021-02-02 | 谷歌有限责任公司 | Captcha自动助理 |
CN113468060A (zh) * | 2021-07-12 | 2021-10-01 | 建信金融科技有限责任公司 | 一种基于复现思想的程序异常检测方法和装置 |
WO2022116508A1 (zh) * | 2020-12-04 | 2022-06-09 | 成都大象分形智能科技有限公司 | 基于获取并识别噪声全景分布模型的信号分析方法及系统 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI674777B (zh) * | 2018-11-09 | 2019-10-11 | 財團法人資訊工業策進會 | 異常流量偵測裝置及其異常流量偵測方法 |
JP7318197B2 (ja) * | 2018-11-15 | 2023-08-01 | 富士通株式会社 | 逐次学習プログラム、逐次学習装置および逐次学習方法 |
US11766575B2 (en) * | 2019-06-24 | 2023-09-26 | Varian Medical Systems, Inc. | Quality assurance process for radiation therapy treatment planning |
CN111079153B (zh) * | 2019-12-17 | 2022-06-03 | 支付宝(杭州)信息技术有限公司 | 安全建模方法、装置、电子设备及存储介质 |
CN113051604B (zh) * | 2021-03-08 | 2022-06-14 | 中国地质大学(武汉) | 一种基于生成式对抗网络的涉密地理表格类数据保护方法 |
EP4079384A1 (en) | 2021-04-22 | 2022-10-26 | Morai Sp. z o.o. | A method of creating ranking, a system for creating ranking and a ranking |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915352A (zh) * | 2014-03-12 | 2015-09-16 | 阿里巴巴集团控股有限公司 | 一种验证MapReduce环境下处理数据正确性的方法和装置 |
CN106548350A (zh) * | 2016-11-17 | 2017-03-29 | 腾讯科技(深圳)有限公司 | 一种数据处理方法及服务器 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7797739B2 (en) * | 2004-12-14 | 2010-09-14 | International Business Machines Corporation | Automated verification of correctness of aspects of an information technology system |
US7752607B2 (en) * | 2005-10-13 | 2010-07-06 | Sap Ag | System and method for testing business process configurations |
WO2010069587A1 (en) * | 2008-12-18 | 2010-06-24 | Nec Europe Ltd. | Method and device for supporting penetration testing of a computer system |
CN102955712B (zh) * | 2011-08-30 | 2016-02-03 | 国际商业机器公司 | 提供关联关系并执行代码优化的方法和装置 |
CN104077303B (zh) * | 2013-03-28 | 2017-07-28 | 国际商业机器公司 | 用于呈现数据的方法和装置 |
CN104731664A (zh) * | 2013-12-23 | 2015-06-24 | 伊姆西公司 | 用于故障处理的方法和装置 |
CN105095230A (zh) * | 2014-04-29 | 2015-11-25 | 国际商业机器公司 | 确定目标数据分析应用的性能预测模型的方法及装置 |
US10110622B2 (en) * | 2015-02-13 | 2018-10-23 | Microsoft Technology Licensing, Llc | Security scanner |
CN106951867B (zh) * | 2017-03-22 | 2019-08-23 | 成都擎天树科技有限公司 | 基于卷积神经网络的人脸识别方法、装置、系统及设备 |
JP6849915B2 (ja) * | 2017-03-31 | 2021-03-31 | 富士通株式会社 | 比較プログラム、比較方法および比較装置 |
CN107808098B (zh) * | 2017-09-07 | 2020-08-21 | 阿里巴巴集团控股有限公司 | 一种模型安全检测方法、装置以及电子设备 |
US10764319B2 (en) * | 2017-10-05 | 2020-09-01 | Honeywell International Inc. | Intelligent automated security vulnerability detection and analysis for industrial internet of things (IIOT) devices |
US20200050766A1 (en) * | 2018-08-08 | 2020-02-13 | Nxp B.V. | Method and data processing system for remotely detecting tampering of a machine learning model |
-
2017
- 2017-09-07 CN CN201710798683.3A patent/CN107808098B/zh active Active
-
2018
- 2018-05-25 TW TW107117909A patent/TWI712913B/zh active
- 2018-09-03 WO PCT/CN2018/103730 patent/WO2019047795A1/zh unknown
- 2018-09-03 CA CA3062722A patent/CA3062722A1/en not_active Abandoned
- 2018-09-03 AU AU2018328515A patent/AU2018328515C1/en active Active
- 2018-09-03 EP EP18854346.6A patent/EP3608822B1/en active Active
-
2019
- 2019-10-30 US US16/668,857 patent/US10691794B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915352A (zh) * | 2014-03-12 | 2015-09-16 | 阿里巴巴集团控股有限公司 | 一种验证MapReduce环境下处理数据正确性的方法和装置 |
CN106548350A (zh) * | 2016-11-17 | 2017-03-29 | 腾讯科技(深圳)有限公司 | 一种数据处理方法及服务器 |
Non-Patent Citations (2)
Title |
---|
IAN J GOODFELLOW ET AL: "generative adversarial nets", 《NIPS"14 PROCEEDINGS OF THE 27TH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING SYSTEMS》 * |
WEIWEI HU: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN", 《HTTPS://ARXIV.ORG/ABS/1702.05983》 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019047795A1 (zh) * | 2017-09-07 | 2019-03-14 | 阿里巴巴集团控股有限公司 | 一种模型安全检测方法、装置以及电子设备 |
US10691794B2 (en) | 2017-09-07 | 2020-06-23 | Alibaba Group Holding Limited | Method, apparatus, and electronic device for detecting model security |
CN108667850B (zh) * | 2018-05-21 | 2020-10-27 | 浪潮集团有限公司 | 一种人工智能服务系统及其实现人工智能服务的方法 |
CN108667850A (zh) * | 2018-05-21 | 2018-10-16 | 济南浪潮高新科技投资发展有限公司 | 一种人工智能服务系统及其实现人工智能服务的方法 |
CN112313647A (zh) * | 2018-08-06 | 2021-02-02 | 谷歌有限责任公司 | Captcha自动助理 |
US12002474B2 (en) | 2018-08-06 | 2024-06-04 | Google Llc | Captcha automated assistant |
CN112313647B (zh) * | 2018-08-06 | 2024-06-11 | 谷歌有限责任公司 | Captcha自动助理 |
CN109543760A (zh) * | 2018-11-28 | 2019-03-29 | 上海交通大学 | 基于图像滤镜算法的对抗样本检测方法 |
CN109543760B (zh) * | 2018-11-28 | 2021-10-19 | 上海交通大学 | 基于图像滤镜算法的对抗样本检测方法 |
CN109726800A (zh) * | 2018-12-29 | 2019-05-07 | 北京中科寒武纪科技有限公司 | 运算方法、装置及相关产品 |
CN109726800B (zh) * | 2018-12-29 | 2019-12-24 | 北京中科寒武纪科技有限公司 | 运算方法、装置及相关产品 |
CN110458662A (zh) * | 2019-08-06 | 2019-11-15 | 西安纸贵互联网科技有限公司 | 反欺诈风控方法及装置 |
CN110633989A (zh) * | 2019-08-16 | 2019-12-31 | 阿里巴巴集团控股有限公司 | 一种风险行为生成模型的确定方法及装置 |
CN110633989B (zh) * | 2019-08-16 | 2023-08-29 | 创新先进技术有限公司 | 一种风险行为生成模型的确定方法及装置 |
CN111159776A (zh) * | 2019-12-24 | 2020-05-15 | 山东浪潮人工智能研究院有限公司 | 一种自适应神经网络模型验证方法及系统 |
CN111949972A (zh) * | 2020-02-19 | 2020-11-17 | 华控清交信息科技(北京)有限公司 | 人工智能模型的验证方法、系统、设备及存储介质 |
CN111949986A (zh) * | 2020-02-19 | 2020-11-17 | 华控清交信息科技(北京)有限公司 | 业务处理方法、系统及存储介质 |
CN111949986B (zh) * | 2020-02-19 | 2023-10-03 | 华控清交信息科技(北京)有限公司 | 业务处理方法、系统及存储介质 |
CN111949972B (zh) * | 2020-02-19 | 2023-10-03 | 华控清交信息科技(北京)有限公司 | 人工智能模型的验证方法、系统、设备及存储介质 |
CN111914256A (zh) * | 2020-07-17 | 2020-11-10 | 华中科技大学 | 一种机器学习训练数据受投毒攻击的防御方法 |
CN111914256B (zh) * | 2020-07-17 | 2021-05-18 | 华中科技大学 | 一种机器学习训练数据受投毒攻击的防御方法 |
WO2022116508A1 (zh) * | 2020-12-04 | 2022-06-09 | 成都大象分形智能科技有限公司 | 基于获取并识别噪声全景分布模型的信号分析方法及系统 |
CN113468060A (zh) * | 2021-07-12 | 2021-10-01 | 建信金融科技有限责任公司 | 一种基于复现思想的程序异常检测方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
EP3608822B1 (en) | 2021-08-04 |
US20200065479A1 (en) | 2020-02-27 |
TW201913441A (zh) | 2019-04-01 |
US10691794B2 (en) | 2020-06-23 |
CA3062722A1 (en) | 2019-03-14 |
CN107808098B (zh) | 2020-08-21 |
WO2019047795A1 (zh) | 2019-03-14 |
AU2018328515C1 (en) | 2021-06-17 |
EP3608822A1 (en) | 2020-02-12 |
AU2018328515B2 (en) | 2021-01-14 |
AU2018328515A1 (en) | 2019-11-28 |
EP3608822A4 (en) | 2020-04-29 |
TWI712913B (zh) | 2020-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107808098B (zh) | 一种模型安全检测方法、装置以及电子设备 | |
CN106887225B (zh) | 基于卷积神经网络的声学特征提取方法、装置和终端设备 | |
CN109299276B (zh) | 一种将文本转化为词嵌入、文本分类方法和装置 | |
CN110532755B (zh) | 一种计算机实现的风险识别的方法及装置 | |
CN115238826B (zh) | 一种模型训练的方法、装置、存储介质及电子设备 | |
CN115238250B (zh) | 一种模型的处理方法、装置及设备 | |
CN115600090A (zh) | 一种模型的所有权验证方法、装置、存储介质及电子设备 | |
CN116630480B (zh) | 一种交互式文本驱动图像编辑的方法、装置和电子设备 | |
CN115567371A (zh) | 一种异常检测方法、装置、设备及可读存储介质 | |
CN115545720A (zh) | 一种模型训练的方法、业务风控的方法及装置 | |
CN115578796A (zh) | 一种活体检测模型的训练方法、装置、设备及介质 | |
CN115017915A (zh) | 一种模型训练、任务执行的方法及装置 | |
CN115204395A (zh) | 数据的处理方法、装置及设备 | |
CN111046658B (zh) | 一种乱序文本识别方法、装置及设备 | |
CN111539520A (zh) | 增强深度学习模型鲁棒性的方法及装置 | |
CN115495776A (zh) | 一种调整模型的方法、装置、存储介质及电子设备 | |
CN109903165A (zh) | 一种模型合并方法和装置 | |
CN117972436B (zh) | 大语言模型的训练方法、训练装置、存储介质及电子设备 | |
CN115423485B (zh) | 数据处理方法、装置及设备 | |
CN117992787A (zh) | 一种模型训练的方法、任务执行的方法及装置 | |
CN117787443A (zh) | 一种风控方法、装置、设备及可读存储介质 | |
CN115310085A (zh) | Sdk的风险检测方法、装置及设备 | |
CN115828171A (zh) | 一种端云协同执行业务的方法、装置、介质及设备 | |
CN116631033A (zh) | 数据处理方法、装置及设备 | |
CN114327977A (zh) | 一种处理绑卡业务的方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201019 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20201019 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Patentee before: Alibaba Group Holding Ltd. |
|
TR01 | Transfer of patent right |