AIGC (AI-Generated Content) has achieved tremendous success in many
appl...
This paper surveys research works in the quickly advancing field of
inst...
Recent years have witnessed success in AIGC (AI Generated Content). Peop...
Deep neural networks (DNNs) are widely deployed on real-world devices.
C...
Deep hiding, embedding images with others using deep neural networks, ha...
DNN accelerators have been widely deployed in many scenarios to speed up...
Adversarial training is an important topic in robust deep learning, but ...
In this paper, we study adversarial training on datasets that obey the
l...
Despite the success of ChatGPT, its performances on most NLP tasks are s...
Machine Learning-as-a-Service, a pay-as-you-go business pattern, is wide...
Despite the remarkable success of large-scale Language Models (LLMs) suc...
Despite the fact that large-scale Language Models (LLM) have achieved SO...
Backdoor attack aims at inducing neural models to make incorrect predict...
Training Graph Neural Networks (GNNs) on large graphs is challenging due...
Bit-flip attacks (BFAs) have attracted substantial attention recently, i...
Deep hiding, concealing secret information using Deep Neural Networks (D...
Transforming off-the-shelf deep neural network (DNN) models into dynamic...
To better handle long-tail cases in the sequence labeling (SL) task, in ...
Fueled by its successful commercialization, the recommender system (RS) ...
In this paper, we consider the instance segmentation task on a long-tail...
Sparse inner product (SIP) has the attractive property of overhead being...
In this paper, we present VerifyML, the first secure inference framework...
Quadruped locomotion now has acquired the skill to traverse or even spri...
3D human pose and shape estimation (a.k.a. "human mesh recovery") has
ac...
Cache side-channel attacks exhibit severe threats to software security a...
The deep learning (DL) technology has been widely used for image
classif...
In this paper, we study the problem of secure ML inference against a
mal...
In this paper, we address the problem of privacy-preserving federated ne...
Decentralized deep learning plays a key role in collaborative model trai...
Deep learning (DL) shows its prosperity in a wide variety of fields. The...
Adversarial training (AT) has proven to be one of the most effective way...
Multiplication-less neural networks significantly reduce the time and en...
Inspired by recent advances in retrieval augmented methods in
NLP <cit.>...
In this paper, we propose a unified whole-body control framework for
vel...
This work presents a novel dense RGB-D SLAM approach for dynamic planar
...
We present the first backdoor attack against the lane detection systems ...
Pre-trained language models (PTLMs) have achieved great success and
rema...
Contrastive learning has become a popular technique to pre-train image
e...
kNN based neural machine translation (kNN-MT) has achieved
state-of-the-...
Natural language generation (NLG) applications have gained great popular...
In this work, we propose a new and general framework to defend against
b...
Backdoor attacks pose a new threat to NLP models. A standard strategy to...
Inspired by the notion that “to copy is easier than to memorize“, in
thi...
Transforming large deep neural network (DNN) models into the multi-exit
...
Pre-trained Natural Language Processing (NLP) models can be easily adapt...
Modern GPU datacenters are critical for delivering Deep Learning (DL) mo...
Out-of-Distribution (OOD) detection is an important problem in natural
l...
Dynamic objects in the environment, such as people and other agents, lea...
Dynamic environments that include unstructured moving objects pose a har...
Deep hiding, embedding images into another using deep neural networks, h...