Malicious domain detection (MDD) is an open security challenge that aims...
In this paper, we propose IMA-GNN as an In-Memory Accelerator for centra...
Accurate and timely prediction of transportation demand and supply is
es...
Graph neural networks (GNNs) are susceptible to privacy inference attack...
Trojan backdoor is a poisoning attack against Neural Network (NN) classi...
This paper explores previously unknown backdoor risks in HyperNet-based
...
The growing use of social media has led to the development of several Ma...
Traffic management systems capture tremendous video data and leverage
ad...
In this work, we show how to jointly exploit adversarial perturbation an...
Machine learning models, especially neural network (NN) classifiers, hav...
Adversarial examples have become one of the largest challenges that mach...
Due to the surprisingly good representation power of complex distributio...
Neural Network classifiers have been used successfully in a wide range o...
Machine learning models, especially neural network (NN) classifiers, are...
The concept of fog computing is centered around providing computation
re...
In this paper, we propose a new paradigm in designing and realizing ener...
The use of unmanned aerial vehicles (UAVs) is growing rapidly across man...
Unmanned aerial vehicles (UAVs) can be used as aerial wireless base stat...
A multiple classifiers fusion localization technique using received sign...