Code review is an essential activity for ensuring the quality and
mainta...
Testing deep learning-based systems is crucial but challenging due to th...
Testing Autonomous Driving Systems (ADSs) is a critical task for ensurin...
The costly human effort required to prepare the training data of machine...
Artificial Intelligence Generated Content (AIGC) has garnered considerab...
Existing Deep Reinforcement Learning (DRL) algorithms suffer from sample...
Due to their widespread use on heterogeneous hardware devices, deep lear...
Deep learning plays a more and more important role in our daily life due...
With the rapid increasing number of open source software (OSS), the majo...
Over the past few years, deep learning (DL) has been continuously expand...
Deep Neural Networks (DNNs) have gained considerable attention in the pa...
Various deep neural networks (DNNs) are developed and reported for their...
Code embedding is a keystone in the application of machine learning on
s...
The adaptive traffic signal control (ATSC) problem can be modeled as a
m...
The chest X-ray plays a key role in screening and diagnosis of many lung...
Single-image deraining is rather challenging due to the unknown rain mod...
Diabetic retinopathy (DR) is a leading cause of vision loss in the world...
The novelty and creativity of DeepFake generation techniques have attrac...
Rain is a common phenomenon in nature and an essential factor for many d...
Deep neural networks (DNN) have shown great success in many computer vis...
With the rapid growth of Android malware, many machine learning-based ma...
Image denoising techniques have been widely employed in multimedia devic...
Adversarial attacks against Deep Neural Networks have been widely studie...
As the GAN-based face image and video generation techniques, widely know...
The recently rapid advances of generative adversarial networks (GANs) in...
Source code summarization aims to generate natural language summaries fr...
In this paper, we present the first attack methodology to extract black-...
With the recent advances in voice synthesis, AI-synthesized fake voices ...
Adversarial attacks against conventional Deep Learning (DL) systems and
...
Currently, Android malware detection is mostly performed on the server s...
Over the past decade, deep learning (DL) has been successfully applied t...
With the proliferation of IoT and edge computing, decentralized learning...
Deep neural networks are vulnerable to noise-based adversarial examples,...
Nowadays, full face synthesis and partial face manipulation by virtue of...
Nowadays, digital facial content manipulation has become ubiquitous and
...
Adversarial attacks of deep neural networks have been intensively studie...
Deep Learning (DL) has recently achieved tremendous success. A variety o...
In recent years, we have witnessed the unprecedented success of generati...
Deep learning (DL) defines a data-driven programming paradigm that
autom...
Deep learning (DL) has recently achieved tremendous success in a variety...
Deep neural networks (DNN), while becoming the driving force of many nov...
In company with the data explosion over the past decade, deep neural net...
In company with the data explosion over the past decade, deep neural net...