With ChatGPT as a representative, tons of companies have began to provid...
Convolutional neural networks (ConvNets) have been successfully applied ...
Java deserialization vulnerability is a severe threat in practice.
Resea...
Bit-flip attacks (BFAs) have attracted substantial attention recently, i...
Prioritizing fairness is of central importance in artificial intelligenc...
The task of classifying mammograms is very challenging because the lesio...
Federated learning enables mutually distrusting participants to
collabor...
Many recent works demonstrated that Deep Learning models are vulnerable ...
Recent work in adversarial machine learning started to focus on the visu...
Neural networks are known to be vulnerable to carefully crafted adversar...
Security-critical tasks require proper isolation from untrusted software...
In this work we study the problem of network morphism, an effective lear...
We present in this paper a systematic study on how to morph a well-train...