Deep Neural Networks (DNNs) have led to unprecedented progress in variou...
Autonomous vehicles (AVs) are more vulnerable to network attacks due to ...
Backdoors implanted in pre-trained language models (PLMs) can be transfe...
Speaker verification has been widely used in many authentication scenari...
Federated learning (FL) has enabled global model training on decentraliz...
Neural table-to-text generation approaches are data-hungry, limiting the...
Cyber threat hunting is a proactive search process for hidden threats in...
Recent works of point clouds show that mulit-frame spatio-temporal model...
Online real-time bidding (RTB) is known as a complex auction game where ...
Chinese word segmentation (CWS) is often regarded as a character-based
s...
For steganalysis, many studies showed that convolutional neural network ...
Recurrent neural networks have achieved great success in many NLP tasks....
Multi-turn conversation understanding is a major challenge for building
...