Influence maximization (IM) is formulated as selecting a set of initial ...
The increasing use of Machine Learning (ML) software can lead to unfair ...
Backdoor attacks insert malicious data into a training set so that, duri...
Contrastive learning has become a popular technique to pre-train image
e...
Public resources and services (e.g., datasets, training platforms,
pre-t...
It is extensively studied that Deep Neural Networks (DNNs) are vulnerabl...
Deep Neural Networks (DNNs) in Computer Vision (CV) are well-known to be...
Deep Neural Networks (DNNs) are well-known to be vulnerable to Adversari...
The recent spades of cyber security attacks have compromised end users' ...
Cloud services have been widely employed in IT industry and scientific
r...