Voice assistants are deployed widely and provide useful functionality.
H...
Content scanning systems employ perceptual hashing algorithms to scan us...
Business Collaboration Platforms like Microsoft Teams and Slack enable
t...
Deep Metric Learning (DML), a widely-used technique, involves learning a...
Kalman Filter (KF) is widely used in various domains to perform sequenti...
Trigger-action platforms (TAPs) allow users to connect independent IoT o...
Physical adversarial examples for camera-based computer vision have so f...
We present Survival-OPT, a physical adversarial example algorithm in the...
In a previous article for S P magazine, we made a case for the new
int...
Recently, interpretable models called self-explaining models (SEMs) have...
Recent advances in Internet of Things (IoT) have enabled myriad domains ...
Deep neural networks (DNNs) are vulnerable to adversarial
examples-malic...
Emerging smart home platforms, which interface with a variety of physica...
Deep learning has proven to be a powerful tool for computer vision and h...
The problem of malware has become significant on Android devices. Librar...