Randomized smoothing-based certification is an effective approach for
ob...
We propose the first black-box targeted attack against online deep
reinf...
Complete verification of deep neural networks (DNNs) can exactly determi...
Fast and accurate climate simulations and weather predictions are critic...
ML-based program cost models have been shown to yield fairly accurate pr...
In recent years numerous methods have been developed to formally verify ...
Basecalling is an essential step in nanopore sequencing analysis where t...
Nanopore sequencing generates noisy electrical signals that need to be
c...
Machine learning has recently gained traction as a way to overcome the s...
The cost of moving data between the memory units and the compute units i...
Semantic image perturbations, such as scaling and rotation, have been sh...
Training machine learning (ML) algorithms is a computationally intensive...
Universal Adversarial Perturbations (UAPs) are imperceptible, image-agno...
Training machine learning algorithms is a computationally intensive proc...
We study data poisoning attacks on online deep reinforcement learning (D...
We now need more than ever to make genome analysis more intelligent. We ...
Hybrid storage systems (HSS) use multiple different storage devices to
p...
A critical step of genome sequence analysis is the mapping of sequenced ...
Recently, Graph Neural Networks (GNNs) have been applied for scheduling ...
Stencil computation is one of the most used kernels in a wide variety of...
We consider language modelling (LM) as a multi-label structured predicti...
Existing neural network verifiers compute a proof that each input is han...
Ongoing climate change calls for fast and accurate weather and climate
m...
Modern data-intensive applications demand high computation capabilities ...
The use of deep 3D point cloud models in safety-critical applications, s...
Spatial queries like range queries, nearest neighbor, circular range que...
Formal verification of neural networks is critical for their safe adopti...
Conventional Bayesian Neural Networks (BNNs) are known to be capable of
...
Ongoing climate change calls for fast and accurate weather and climate
m...
We present a novel method for generating symbolic adversarial examples: ...
Certifying the robustness of neural networks against adversarial attacks...
Objectives: To predict mechanical ventilation requirement and mortality ...
Computation in-memory is a promising non-von Neumann approach aiming at
...
A significant challenge in Glioblastoma (GBM) management is identifying
...
We present a precise and scalable verifier for recurrent neural networks...
Specialized accelerators for tensor-operations, such as blocked-matrix
o...
We develop an effective generation of adversarial attacks on neural mode...
The conventional approach of moving data to the CPU for computation has
...
Near-memory Computing (NMC) promises improved performance for the
applic...
Emerging computing architectures such as near-memory computing (NMC) pro...
We present a training system, which can provably defend significantly la...
To securely leverage the advantages of Cloud Computing, recently a lot o...