Using Fourier analysis, we explore the robustness and vulnerability of g...
In recent years, there has been growing concern over the vulnerability o...
With the development of machine learning, datasets for models are gettin...
Vanishing component analysis (VCA) computes approximate generators of
va...
This paper analyzes various types of image misclassification from a
game...
The approximate vanishing ideal of a set of points X = {𝐱_1,
…, 𝐱_m}⊆ [0...
Adversarial attacks have only focused on changing the predictions of the...
We propose an evolutionary computation method for an adversarial attack ...
We address adversarial attacks on the actuators at the joints of legged
...
The vulnerability of convolutional neural networks (CNNs) to image
pertu...
This study is aimed at addressing the problem of fault tolerance of quad...
Deep neural network image classifiers are known to be susceptible not on...
Skeleton-based action recognition models have recently been shown to be
...
Unsupervised domain adaptation, which involves transferring knowledge fr...
Normalization of polynomials plays a vital role in the approximate basis...
The approximate basis computation of vanishing ideals has recently been
...
In recent years, deep neural networks (DNNs) have achieved equivalent or...
In the last decade, the approximate vanishing ideal and its basis
constr...
Approximate vanishing ideal, which is a new concept from computer algebr...
The vanishing ideal is a set of polynomials that takes zero value on the...