Traditional adversarial attacks concentrate on manipulating clean exampl...
Decentralized federated learning (DFL) has gained popularity due to its
...
In autonomous driving (AD), accurate perception is indispensable to achi...
Image synthesis has seen significant advancements with the advent of
dif...
Recently, MLP-based models have become popular and attained significant
...
Recently, diffusion models have achieved remarkable success in generatin...
Recent works reveal that adversarial augmentation benefits the generaliz...
Diffusion-based generative models have shown great potential for image
s...
In heterogeneous networks (HetNets), the overlap of small cells and the ...
Reconfigurable intelligent surfaces (RISs) achieve high passive beamform...
Performing neural network inference on encrypted data without decryption...
DNN-based video object detection (VOD) powers autonomous driving and vid...
Bound propagation methods, when combined with branch and bound, are amon...
As spiking neural networks (SNNs) are deployed increasingly in real-worl...
Adversarial patch attacks that craft the pixels in a confined region of ...
Compressing Deep Neural Network (DNN) models to alleviate the storage an...
Recent works in neural network verification show that cheap incomplete
v...
Model-agnostic meta-learning (MAML) has emerged as one of the most succe...
In this work, we focus on the study of stochastic zeroth-order (ZO)
opti...
Formal verification of neural networks (NNs) is a challenging and import...
Hybrid analog-digital (A/D) transceivers designed for millimeter wave
(m...
Optimization theory assisted algorithms have received great attention fo...
Linear relaxation based perturbation analysis for neural networks, which...
Although deep neural networks (DNNs) have achieved a great success in va...
Graph Neural Networks (GNNs) have made significant advances on several
f...
Existing domain adaptation methods aim at learning features that can be
...
It is known that deep neural networks (DNNs) could be vulnerable to
adve...
The adaptive momentum method (AdaMM), which uses past gradients to updat...
In this paper, we study the problem of constrained robust (min-max)
opti...
Deep neural networks (DNNs), as the basis of object detection, will play...
Robust machine learning is currently one of the most prominent topics wh...
Graph neural networks (GNNs) which apply the deep neural networks to gra...
A human does not have to see all elephants to recognize an animal as an
...
It is widely known that convolutional neural networks (CNNs) are vulnera...
It is well known that deep neural networks (DNNs) are vulnerable to
adve...
Weight pruning and weight quantization are two important categories of D...
Deep neural networks (DNNs) although achieving human-level performance i...
When generating adversarial examples to attack deep neural networks (DNN...