Quantization emerges as one of the most promising approaches for deployi...
Quantization has emerged as an essential technique for deploying deep ne...
Despite the broad application of Machine Learning models as a Service
(M...
Extensive studies have shown that deep learning models are vulnerable to...
Innovative learning based structures have recently been proposed to tack...
Physical world adversarial attack is a highly practical and threatening
...
Machine learning (ML) systems have achieved remarkable performance acros...
Quantization of transformer language models faces significant challenges...
Vision transformer emerges as a potential architecture for vision tasks....
Hierarchical data storage is crucial for cloud-edge-end time-series data...
Adversarial attacks are valuable for evaluating the robustness of deep
l...
Recently, adversarial attacks for audio recognition have attracted much
...
Adversarial training has been demonstrated to be one of the most effecti...
Transformer architecture has become the fundamental element of the wides...
Adversarial training (AT) methods are effective against adversarial atta...
Existing Binary Neural Networks (BNNs) mainly operate on local convoluti...
Billions of people are sharing their daily life images on social media e...
For black-box attacks, the gap between the substitute model and the vict...
To operate in real-world high-stakes environments, deep learning systems...
Batch normalization (BN) is a milestone technique in deep learning. It
n...
Recently, post-training quantization (PTQ) has driven much attention to
...
Defense models against adversarial attacks have grown significantly, but...
Open World Object Detection (OWOD), simulating the real dynamic world wh...
Crowd counting, which is significantly important for estimating the numb...
Deep neural networks (DNNs) are vulnerable to adversarial noises, which
...
Recently, generative data-free quantization emerges as a practical appro...
Prohibited items detection in X-ray images often plays an important role...
Automatic security inspection using computer vision technology is a
chal...
Few-shot learning is an interesting and challenging study, which enables...
Deep learning models are vulnerable to adversarial examples. As a more
t...
Quantization has emerged as one of the most prevalent approaches to comp...
Security inspection is X-ray scanning for personal belongings in suitcas...
Deep neural networks (DNNs) have achieved remarkable performance across ...
There is now extensive evidence demonstrating that deep neural networks ...
By adding human-imperceptible noise to clean images, the resultant
adver...
Adversarial examples are inputs with imperceptible perturbations that ea...
Adversarial attacks are valuable for providing insights into the blind-s...
Object detection has taken advantage of the advances in deep convolution...
The binary neural network, largely saving the storage and computation, s...
Gradient-based approximate inference methods, such as Stein variational
...
Abstract reasoning refers to the ability to analyze information, discove...
Extracting graph representation of visual scenes in image is a challengi...
Recently low-bit (e.g., 8-bit) network quantization has been extensively...
Visual loop closure detection, which can be considered as an image retri...
Binary neural networks have attracted numerous attention in recent years...
Fine-grained visual categorization (FGVC) is an important but challengin...
Weight and activation binarization is an effective approach to deep neur...
Deep neural networks have been found vulnerable to noises like adversari...
Deep neural networks (DNNs) are vulnerable to adversarial examples where...
Adversarial examples, intentionally designed inputs tending to mislead d...