Adversarial examples threaten the integrity of machine learning systems ...
Perception is crucial in the realm of autonomous driving systems, where
...
Defending machine-learning (ML) models against white-box adversarial att...
One-shot coreset selection aims to select a subset of the training data,...
Preprocessing and outlier detection techniques have both been applied to...
Out-of-distribution (OOD) detection plays a crucial role in ensuring the...
Detecting deepfakes is an important problem, but recent work has shown t...
We present DeClaW, a system for detecting, classifying, and warning of
a...
Adversaries are capable of adding perturbations to an image to fool mach...
Despite the remarkable success of deep neural networks, significant conc...
Model Stealing (MS) attacks allow an adversary with black-box access to ...
We present Survival-OPT, a physical adversarial example algorithm in the...
Adversarial training is an effective defense method to protect classific...
Deep Neural Networks (DNNs) are known to be susceptible to adversarial
e...
Machine learning has proven to be an extremely useful tool for solving
c...
Recently, interpretable models called self-explaining models (SEMs) have...
Existing deep neural networks, say for image classification, have been s...
Internet of Things (IoT) devices are becoming increasingly important. Th...
We provide a methodology, resilient feature engineering, for creating
ad...
Internet of Things is growing rapidly, with many connected devices now
a...
Deep neural networks (DNNs) are vulnerable to adversarial
examples-malic...
Emerging smart home platforms, which interface with a variety of physica...
Deep learning has proven to be a powerful tool for computer vision and h...
The problem of malware has become significant on Android devices. Librar...