Positive-Unlabeled (PU) Learning is a challenge presented by binary
clas...
The widespread adoption of the Android operating system has made malicio...
Nowadays, IoT devices integrate a wealth of third-party components (TPCs...
Automatically generating human-readable text describing the functionalit...
Despite the fact that DeepFake forgery detection algorithms have achieve...
Recently, face swapping has been developing rapidly and achieved a surpr...
With the development of deep learning processors and accelerators, deep
...
In recent years, REST API fuzzing has emerged to explore errors on a clo...
Trojan attack on deep neural networks, also known as backdoor attack, is...
Currently, natural language processing (NLP) models are wildly used in
v...
Currently, the development of IoT firmware heavily depends on third-part...
Vertical federated learning is a trending solution for multi-party
colla...
Vertical federated learning (VFL) is an emerging paradigm that enables
c...
Understanding the decision process of neural networks is hard. One vital...
Facilitated by messaging protocols (MP), many home devices are connected...
Towards real-world information extraction scenario, research of relation...
One intriguing property of adversarial attacks is their "transferability...
Facial Liveness Verification (FLV) is widely used for identity authentic...
Deep neural networks (DNNs) have demonstrated their outperformance in va...
Contrastive Learning has emerged as a powerful representation learning m...