Entity alignment (EA) aims to discover the equivalent entities in differ...
Finding classifiers robust to adversarial examples is critical for their...
Recent text-to-image diffusion models such as MidJourney and Stable Diff...
Large-scale commonsense knowledge bases empower a broad range of AI
appl...
Chinese Grammatical Error Correction (CGEC) is both a challenging NLP ta...
Chinese Spell Checking (CSC) aims to detect and correct Chinese spelling...
Extensive literature on backdoor poison attacks has studied attacks and
...
Backdoors are powerful attacks against deep neural networks (DNNs). By
p...
Data augmentation with Mixup has been proven an effective method to
regu...
Server breaches are an unfortunate reality on today's Internet. In the
c...
In deep neural networks for facial recognition, feature vectors are nume...
The rapid adoption of facial recognition (FR) technology by both governm...
In adversarial machine learning, new defenses against attacks on deep
le...
Advances in deep learning have introduced a new wave of voice synthesis
...
Language understanding in speech-based systems have attracted much atten...
Edge video analytics is becoming the solution to many safety and managem...
Anomaly detection presents a unique challenge in machine learning, due t...
Anonymity systems like Tor are vulnerable to Website Fingerprinting (WF)...
Backdoor attacks embed hidden malicious behaviors inside deep neural net...
The vulnerability of deep neural networks (DNNs) to adversarial examples...
Today's proliferation of powerful facial recognition models poses a real...
Despite continuous efforts to build and update network infrastructure, m...
As deep learning classifiers continue to mature, model providers with
su...
Recent work has proposed the concept of backdoor attacks on deep neural
...
Deep neural networks are vulnerable to adversarial attacks. Numerous eff...
Recent works have explained the principle of using ultrasonic transmissi...
Millimeter-wave wireless networks offer high throughput and can (ideally...
Wireless devices are everywhere, at home, at the office, and on the stre...
Wireless devices are everywhere, at home, at the office, and on the stre...
Deep learning is often constrained by the lack of large, diverse labeled...