Speaker Verification (SV) is widely deployed in mobile systems to
authen...
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where
ad...
While the real world application of reinforcement learning (RL) is becom...
Deep neural networks (DNNs) are proved to be vulnerable against backdoor...
Deep neural networks, particularly face recognition models, have been sh...
Detecting out-of-distribution (OOD) and adversarial samples is essential...
Many adversarial attacks and defenses have recently been proposed for De...
The purpose of this study was to develop a fully-automated segmentation
...
Due to the increasing complexity seen in both workloads and hardware
res...
Emerging edge intelligence applications require the server to continuous...
The black-box nature of deep neural networks (DNNs) facilitates attacker...