The efficacy of availability poisoning, a method of poisoning data by
in...
Unlearnable example attacks are data poisoning techniques that can be us...
Open software supply chain attacks, once successful, can exact heavy cos...
Adversarial attacks can deceive neural networks by adding tiny perturbat...
Large neural networks are often overparameterised and prone to overfitti...
Due to the vulnerability of deep neural networks (DNNs) to adversarial
e...
Network Architecture Search (NAS) methods have recently gathered much
at...
Deep convolutional neural networks are susceptible to adversarial attack...
We present the first differentiable Network Architecture Search (NAS) fo...
Modern deep Convolutional Neural Networks (CNNs) are computationally
dem...
Recent research on reinforcement learning has shown that trained agents ...
Deep convolutional neural networks (CNNs) are powerful tools for a wide ...
Convolutional Neural Networks (CNNs) are widely used to solve classifica...
Making deep convolutional neural networks more accurate typically comes ...