Deep Neural Networks (DNNs) are vulnerable to adversarial examples, whil...
Adversarial attacks and defenses in machine learning and deep neural net...
Cloud-edge collaborative inference approach splits deep neural networks
...
This paper presents two results concerning uniform confidence intervals ...
Recent years have witnessed a growing academic interest in multi-view
su...
Tensor Robust Principal Component Analysis (TRPCA), which aims to recove...
Typical deep neural network (DNN) backdoor attacks are based on triggers...
Recently, the scheme of model-X knockoffs was proposed as a promising
so...
The vulnerability of deep neural networks to adversarial examples, which...
While most existing segmentation methods usually combined the powerful
f...
Robots still struggle to dynamically traverse complex 3-D terrain with m...
Neural networks are vulnerable to adversarial examples, which are malici...
This paper addresses the task of estimating the 6 degrees of freedom pos...
We propose a novel perspective to understand deep neural networks in an
...
Network pruning is an important research field aiming at reducing
comput...
We propose an efficient estimation method for the income Pareto exponent...
In recent years, neural networks have been used to generate music pieces...
Representation based classification (RC) methods such as sparse RC (SRC)...