Splitting network computations between the edge device and a server enab...
We consider the problem of training User Verification (UV) models in
fed...
Machine learning-based User Authentication (UA) models have been widely
...
Deep learning classifiers are known to be vulnerable to adversarial exam...
Deep neural networks are vulnerable against adversarial examples. In thi...
It is known that humans display "shape bias" when classifying new items,...
Deep neural networks are known to be vulnerable to adversarial examples,...
Due to the growth of video data on Internet, automatic video analysis ha...
Despite the rapid progress of the techniques for image classification, v...
Convolutional Neural Networks (CNNs) have achieved state-of-the-art
perf...
We consider the setting where a collection of time series, modeled as ra...
In this paper, we propose a method for real-time high density impulse no...
In this paper, we propose a method for image block loss restoration base...