This article studies the problem of applying normal forces on a surface,...
Similarity metrics have played a significant role in computer vision to
...
This paper proposes a data-efficient detection method for deep neural
ne...
The robustness of image segmentation has been an important research topi...
Cybersecurity attacks against industrial control systems and cyber-physi...
Control barrier functions (CBFs) have been widely applied to safety-crit...
This paper proposes an easy-to-compute upper bound for the overlap index...
We propose a framework in which multiple entities collaborate to build a...
The control problem of a multi-copter swarm, mechanically coupled throug...
Control barrier functions (CBF) are widely used in safety-critical
contr...
Large language models (such as OpenAI's Codex) have demonstrated impress...
Securing enterprise networks presents challenges in terms of both their ...
In this paper, we propose a deep forward-backward stochastic differentia...
We show that by controlling parts of a physical environment in which a
p...
This paper proposes a new defense against neural network backdooring att...
This paper reports a novel approach that uses transistor aging in an
int...
This paper proposes a novel two-stage defense (NNoculation) against
back...
The paper proposes an on-line monitoring framework for continuous real-t...