While self-supervised learning has improved anomaly detection in compute...
Spurred by the recent rapid increase in the development and distribution...
Two studies tested the hypothesis that a Large Language Model (LLM) can ...
Speech deepfakes are artificial voices generated by machine learning mod...
Adversarial examples in NLP are receiving increasing research attention....
Animals are able to rapidly infer from limited experience when sets of s...
Current deep learning methods for anomaly detection in text rely on
supe...
Research shows that natural language processing models are generally
con...
One-class anomaly detection is challenging. A representation that clearl...
Exploration in environments with sparse rewards is difficult for artific...
While recent efforts have shown that neural text processing models are
v...
The model of camera that was used to capture a particular photographic i...
Facial verification systems are vulnerable to poisoning attacks that mak...
Imagine two high-dimensional clusters and a hyperplane separating them.
...
Designing models that are robust to small adversarial perturbations of t...
The security infrastructure is ill-equipped to detect and deter the smug...
We review the relatively immature field of automated image analysis for ...
Non-intrusive inspection systems based on X-ray radiography techniques a...
It is well accepted that image segmentation can benefit from utilizing
m...
Many deep Convolutional Neural Networks (CNN) make incorrect predictions...