Numerous adversarial attack methods have been developed to generate
impe...
Backdoor data detection is traditionally studied in an end-to-end superv...
While vision transformers (ViTs) have continuously achieved new mileston...
Recently, high-quality video conferencing with fewer transmission bits h...
Neural architecture search (NAS) and network pruning are widely studied
...
Human pose estimation (HPE) usually requires large-scale training data t...
It has been well recognized that neural network based image classifiers ...
This work targets the commonly used FPGA (field-programmable gate array)...
This work proposes a novel Deep Neural Network (DNN) quantization framew...
This paper proposes Characteristic Examples for effectively fingerprinti...
Recent works in neural network verification show that cheap incomplete
v...
In this work, we focus on the study of stochastic zeroth-order (ZO)
opti...
Deep Neural Networks (DNNs) have achieved extraordinary performance in
v...
Formal verification of neural networks (NNs) is a challenging and import...
Model-agnostic meta-learning (MAML) effectively meta-learns an initializ...
With the tremendous success of deep learning, there exists imminent need...
Automated Lane Centering (ALC) systems are convenient and widely deploye...
Human pose estimation has been widely studied with much focus on supervi...
Mobile devices are becoming an important carrier for deep learning tasks...
Mode connectivity provides novel geometric insights on analyzing loss
la...
High-end mobile platforms rapidly serve as primary computing devices for...
We propose a novel Enhanced Feature Aggregation and Selection network
(E...
To facilitate the deployment of deep neural networks (DNNs) on
resource-...
Lane-Keeping Assistance System (LKAS) is convenient and widely available...
Linear relaxation based perturbation analysis for neural networks, which...
Although deep neural networks (DNNs) have achieved a great success in va...
Graph Neural Networks (GNNs) have made significant advances on several
f...
Designing effective defense against adversarial attacks is a crucial top...
Recurrent neural networks (RNNs) based automatic speech recognition has
...
Recent study of adversarial attacks has revealed the vulnerability of mo...
Despite the great achievements of the modern deep neural networks (DNNs)...
Accelerating DNN execution on various resource-limited computing platfor...
With the emergence of a spectrum of high-end mobile devices, many
applic...
It is known that deep neural networks (DNNs) could be vulnerable to
adve...
The adaptive momentum method (AdaMM), which uses past gradients to updat...
Recently, pre-trained language representation flourishes as the mainstay...
Model compression techniques on Deep Neural Network (DNN) have been wide...
Despite achieving remarkable success in various domains, recent studies ...
Robust machine learning is currently one of the most prominent topics wh...
Large deep neural network (DNN) models pose the key challenge to energy
...
Graph neural networks (GNNs) which apply the deep neural networks to gra...
Despite the great achievements of deep neural networks (DNNs), the
vulne...
It is widely known that convolutional neural networks (CNNs) are vulnera...
It is well known that deep neural networks (DNNs) are vulnerable to
adve...
Weight pruning and weight quantization are two important categories of D...
To facilitate efficient embedded and hardware implementations of deep ne...
Recurrent Neural Networks (RNNs) are becoming increasingly important for...
Many model compression techniques of Deep Neural Networks (DNNs) have be...
Deep neural networks (DNNs) although achieving human-level performance i...
Deep neural networks (DNNs) are known vulnerable to adversarial attacks....