For machine learning with tabular data, Table Transformer (TabTransforme...
Differentially private synthetic data is a promising alternative for
sen...
Visual Prompting (VP) is an emerging and powerful technique that allows
...
Recently, quantum classifiers have been known to be vulnerable to advers...
A plethora of attack methods have been proposed to generate adversarial
...
Recent studies show that private training data can be leaked through the...
Deep neural networks have developed rapidly and have achieved outstandin...
With the growing use of camera devices, the industry has many image data...
Studying the sensitivity of weight perturbation in neural networks and i...
Adversarial examples causing evasive predictions are widely used to eval...
Adversarial robustness has become an emerging challenge for neural netwo...
In Internet of Things (IoT) driven smart-world systems, real-time
crowd-...
In modern information systems different information features, about the ...
Recent advances in AI technology have made the forgery of digital images...
We investigate a problem of finding the minimum, in which each user has ...
Recent studies have found that deep learning systems are vulnerable to
a...
In recent years, defending adversarial perturbations to natural examples...
Understanding and characterizing the subspaces of adversarial examples a...
The advance of smartphones and cellular networks boosts the need of mobi...