With the increase in software vulnerabilities that cause significant eco...
Conditioned diffusion models have demonstrated state-of-the-art text-to-...
Recent studies show that deep neural networks (DNNs) are vulnerable to
b...
Neural Architecture Search (NAS) has become a de facto approach in the r...
Convolutional models have been widely used in multiple domains. However,...
In this work we construct a stochastic contact variational integrator an...
Video moderation, which refers to remove deviant or explicit content fro...
Most existing neural architecture search (NAS) algorithms are dedicated ...
E-commerce companies have to face abnormal sellers who sell potentially-...
Among ubiquitous multimodal data in the real world, text is the modality...
High quality AI solutions require joint optimization of AI algorithms, s...
A class of Hamiltonian stochastic differential equations with multiplica...
Adversarial examples are perturbed inputs which can cause a serious thre...
High quality AI solutions require joint optimization of AI algorithms an...
Deep Neural Networks (DNNs) are known to be vulnerable to the maliciousl...
Recent work has demonstrated that neural networks are vulnerable to
adve...
Few-shot image classification aims to classify unseen classes with limit...
Developing object detection and tracking on resource-constrained embedde...
Developing artificial intelligence (AI) at the edge is always challengin...
Developing deep learning models for resource-constrained Internet-of-Thi...
While embedded FPGAs are attractive platforms for DNN acceleration on
ed...
The task of Language-Based Image Editing (LBIE) aims at generating a tar...
Recently, we have seen a rapid development of Deep Neural Network (DNN) ...
We propose a network for Congested Scene Recognition called CSRNet to pr...