We demonstrate that a supply-chain level compromise of the adaptive crui...
Boundary based blackbox attack has been recognized as practical and
effe...
Gradient estimation and vector space projection have been studied as two...
Modern self-driving perception systems have been shown to improve upon
p...
Machine learning (ML), especially deep neural networks (DNNs) have been
...
Machine learning models, especially neural networks (NNs), have achieved...
Unsupervised node embedding methods (e.g., DeepWalk, LINE, and node2vec)...
Malicious calls, i.e., telephony spams and scams, have been a long-stand...