Recent CNN and Transformer-based models tried to utilize frequency and
p...
Deep neural networks are valuable assets considering their commercial
be...
Deep neural networks (DNNs) are widely deployed on real-world devices.
C...
Scene text image super-resolution (STISR), aiming to improve image quali...
The ultimate goal for foundation models is realizing task-agnostic, i.e....
Backdoor defenses have been studied to alleviate the threat of deep neur...
Third-party resources (e.g., samples, backbones, and pre-trained models)...
Recent studies revealed that deep neural networks (DNNs) are exposed to
...
Deep neural networks (DNNs) are vulnerable to backdoor attacks. The back...
Recent studies have demonstrated that deep neural networks (DNNs) are
vu...
In real-world crowdsourcing annotation systems, due to differences in us...
Deep models have been widely and successfully used in image manipulation...
As an emerging secure learning paradigm in leveraging cross-silo private...
Deep neural networks (DNNs) have demonstrated their superiority in pract...
With the thriving of deep learning in processing point cloud data, recen...
Image representation is critical for many visual tasks. Instead of
repre...
Currently, deep neural networks (DNNs) are widely adopted in different
a...
The security of deep neural networks (DNNs) has attracted increasing
att...
To explore the vulnerability of deep neural networks (DNNs), many attack...
Real-world recognition system often encounters a plenty of unseen labels...
As an emerging secure learning paradigm in leveraging cross-agency priva...
Recently, deep learning methods have shown great success in 3D point clo...
The transformer models have shown promising effectiveness in dealing wit...
Face forgery has attracted increasing attention in recent applications o...
DNNs' demand for massive data forces practitioners to collect data from ...
Visual object tracking (VOT) has been widely adopted in mission-critical...
Obtaining a well-trained model involves expensive data collection and
tr...
Adversarial robustness has received increasing attention along with the ...
HyperGraph Convolutional Neural Networks (HGCNNs) have demonstrated thei...
Backdoor attack intends to inject hidden backdoor into the deep neural
n...
The study of adversarial examples and their activation has attracted
sig...
Deep neural networks (DNNs) are vulnerable to the backdoor attack,
which...
To explore the vulnerability of deep neural networks (DNNs), many attack...
Regression tree (RT) has been widely used in machine learning and data m...
Recently, deep neural networks (DNNs) have been widely and successfully ...
Deep neural networks (DNNs) have demonstrated excellent performance on
v...
Interpretability and effectiveness are two essential and indispensable
r...
Deep neural networks (DNNs) have demonstrated their power on many widely...
Convolutional neural networks (CNNs) have been successfully used in a ra...
Deep neural networks (DNNs) exhibit great success on many tasks with the...
The parameters of a q-ary MDS Euclidean self-dual codes are completely
d...
The study on improving the robustness of deep neural networks against
ad...
Training deep neural networks (DNNs) in the presence of noisy labels is ...
Federated learning, as an emerging distributed training model of neural
...
Skip connections are an essential component of current state-of-the-art ...
The deep learning-based visual tracking algorithms such as MDNet achieve...
Data privacy protection is an important research area, which is especial...
Adversarial defense is a popular and important research area. Due to its...
Recently, a variety of regularization techniques have been widely applie...
Learning nonlinear dynamics from diffusion data is a challenging problem...