Data is a critical asset in AI, as high-quality datasets can significant...
The widespread adoption of the Android operating system has made malicio...
Nowadays, IoT devices integrate a wealth of third-party components (TPCs...
Automatically generating human-readable text describing the functionalit...
Knowledge graph reasoning (KGR) – answering complex logical queries over...
With the widespread application in industrial manufacturing and commerci...
It is well-known that recurrent neural networks (RNNs), although widely ...
Despite the fact that DeepFake forgery detection algorithms have achieve...
Recently, face swapping has been developing rapidly and achieved a surpr...
With the development of deep learning processors and accelerators, deep
...
In recent years, REST API fuzzing has emerged to explore errors on a clo...
Trojan attack on deep neural networks, also known as backdoor attack, is...
Currently, natural language processing (NLP) models are wildly used in
v...
Programmable Logic Controllers (PLCs) are the core control devices in
In...
Currently, the development of IoT firmware heavily depends on third-part...
Vertical federated learning is a trending solution for multi-party
colla...
Vertical federated learning (VFL) is an emerging paradigm that enables
c...
This paper asks the intriguing question: is it possible to exploit neura...
As an emerging machine learning paradigm, self-supervised learning (SSL)...
Recently, knowledge representation learning (KRL) is emerging as the
sta...
Understanding the decision process of neural networks is hard. One vital...
Facilitated by messaging protocols (MP), many home devices are connected...
Federated learning (FL) is a collaborative learning paradigm where
parti...
Towards real-world information extraction scenario, research of relation...
One intriguing property of adversarial attacks is their "transferability...
Transfer learning is an important approach that produces pre-trained tea...
Facial Liveness Verification (FLV) is widely used for identity authentic...
Short video has witnessed rapid growth in China and shows a promising ma...
Predicting human motion from historical pose sequence is crucial for a
m...
Deep neural networks (DNNs) have demonstrated their outperformance in va...
Although deep learning models have achieved unprecedented success, their...
The malware has been being one of the most damaging threats to computers...
Deep learning (DL) models, especially those large-scale and high-perform...
Answering complex logical queries over large-scale knowledge graphs (KGs...
For protecting users' private data, local differential privacy (LDP) has...
Neural Architecture Search (NAS) represents an emerging machine learning...
Deep Neural Networks (DNN) are known to be vulnerable to adversarial sam...
Smart contracts hold digital coins worth billions of dollars, their secu...
Contrastive Learning has emerged as a powerful representation learning m...
This paper strives to predict fine-grained fashion similarity. In this
s...
Speaker recognition refers to audio biometrics that utilizes acoustic
ch...
Human motion prediction from historical pose sequence is at the core of ...
Multi-frame human pose estimation in complicated situations is challengi...
Despite that deep neural networks (DNNs) have achieved enormous success ...
This paper aims for the language-based product image retrieval task. The...
This paper targets the task of language-based moment localization. The
l...
Providing explanations for deep neural networks (DNNs) is essential for ...
Neural backdoors represent one primary threat to the security of deep
le...
Federated learning enables mutually distrusting participants to
collabor...
Crowdsourcing has attracted much attention for its convenience to collec...