Music Information Retrieval (MIR) has seen a recent surge in deep
learni...
Diffusion models have been leveraged to perform adversarial purification...
Sparsely-gated Mixture of Expert (MoE), an emerging deep model architect...
In this paper, we define, evaluate, and improve the “relay-generalizatio...
We present Queer in AI as a case study for community-led participatory d...
Most work on the formal verification of neural networks has focused on
b...
The success of AlphaZero (AZ) has demonstrated that neural-network-based...
We study how to certifiably enforce forward invariance properties in neu...
Lipschitz constants are connected to many properties of neural networks,...
Vehicle-to-vehicle (V2V) communications under dense urban environments
u...
Reconfigurable intelligent surface (RIS) has recently attracted a spurt ...
The outage performance of multiple-input multiple-output (MIMO) techniqu...
This paper thoroughly investigates the performance of variable-rate hybr...
Vehicle-to-vehicle (V2V) communications under dense urban environments
u...
Bound propagation methods, when combined with branch and bound, are amon...
Certifiable robustness is a highly desirable property for adopting deep
...
Safe reinforcement learning (RL) trains a policy to maximize the task re...
CT-based bronchial tree analysis plays an important role in the
computer...
This paper investigates a reconfigurable intelligent surface (RIS)-aided...
Recently, video-based action recognition methods using convolutional neu...
Certified robustness is a desirable property for deep neural networks in...
Due to the proliferation of renewable energy and its intrinsic intermitt...
Recently, the vulnerability of deep image classification models to
adver...
Robustness and counterfactual bias are usually evaluated on a test datas...
Recently, bound propagation based certified adversarial defense have bee...
Recent works in neural network verification show that cheap incomplete
v...
As an important perceptual characteristic of the Human Visual System (HV...
We study the robustness of reinforcement learning (RL) with adversariall...
Formal verification of neural networks (NNs) is a challenging and import...
We study the problem of efficient adversarial attacks on tree based ense...
Repetition is a basic indicator of musical structure. This study introdu...
Recent papers have demonstrated that ensemble stumps and trees could be
...
Large-batch training is an efficient approach for current distributed de...
Adversarial black-box attacks aim to craft adversarial perturbations by
...
Recently, BERT has become an essential ingredient of various NLP deep mo...
Deep Reinforcement Learning (DRL) is vulnerable to small adversarial
per...
Linear relaxation based perturbation analysis for neural networks, which...
Robustness verification that aims to formally certify the prediction beh...
Adversarial training is one of the most popular ways to learn robust mod...
Feature pyramids are widely exploited in many detectors to solve the sca...
The graph-based semi-supervised label propagation algorithm has delivere...
Recent improvements in large-scale language models have driven progress ...
We propose an algorithm to enhance certified robustness of a deep model
...
Chinese meme-face is a special kind of internet subculture widely spread...
As deep neural networks (DNNs) have become increasingly important and
po...
Training neural networks with verifiable robustness guarantees is
challe...
We study the robustness verification problem for tree-based models, incl...
Recent works have shown the effectiveness of randomized smoothing as a
s...
The outage performance of multiple-input multiple-output (MIMO) techniqu...
Single-image super-resolution aims to generate a high-resolution version...