With the broad reach of the internet and smartphones, e-commerce platfor...
With the democratization of e-commerce platforms, an increasingly divers...
A beam codebook of 5G millimeter wave (mmWave) for data communication
co...
Deep learning models are vulnerable to external attacks. In this paper, ...
Machine learning models are vulnerable to adversarial examples. An adver...
Current approaches for Knowledge Distillation (KD) either directly use
t...
Document digitization is becoming increasingly crucial. In this work, we...
We present an end-to-end machine-human image annotation system where eac...