Deep Neural Network (DNN) models are often deployed in resource-sharing
...
3D human pose estimation has been researched for decades with promising
...
The task of multimodal referring expression comprehension (REC), aiming ...
The backdoor attack poses a new security threat to deep neural networks....
Object detection is the foundation of various critical computer-vision t...
Federated Learning (FL), a distributed machine learning paradigm, has be...
Backdoor attacks have been a critical threat to deep neural network (DNN...
As a well-known physical unclonable function that can provide huge numbe...
Multiple datasets and open challenges for object detection have been
int...
Federated learning (FL) trains a global model across a number of
decentr...
Deep learning models have been shown to be vulnerable to recent backdoor...
Rowhammer has drawn much attention from both academia and industry in th...
A backdoor deep learning (DL) model behaves normally upon clean inputs b...
Physical Unclonable Function (PUF) is a hardware security primitive with...
The data scarcity problem in Electroencephalography (EEG) based affectiv...
There is currently a burgeoning demand for deploying deep learning (DL)
...
Recognizing and localizing objects in the 3D space is a crucial ability ...
Though deep neural network models exhibit outstanding performance for va...
Convolutional neural networks have allowed remarkable advances in single...
Federated learning (FL) and split learning (SL) are state-of-the-art
dis...
Rowhammer attacks that corrupt level-1 page tables to gain kernel privil...
Normalization techniques are crucial in stabilizing and accelerating the...
This paper reviews the video extreme super-resolution challenge associat...
This work provides the community with a timely comprehensive review of
b...
Rowhammer is a hardware vulnerability in DRAM memory, where repeated acc...
Deep learning usually achieves the best results with complete supervisio...
While image classification models have recently continued to advance, mo...
As recently emerged rowhammer exploits require undocumented DRAM address...
Existing speculative execution attacks are limited to breaching
confiden...
Rowhammer exploits frequently access specific DRAM rows (i.e., hammer ro...
This work corroborates a run-time Trojan detection method exploiting STR...
In paravirtualization, the page table management components of the guest...
Traffic congestion in metropolitan areas is a world-wide problem that ca...
We present GluonCV and GluonNLP, the deep learning toolkits for computer...
With an increasing demand for training powers for deep learning algorith...
Batching is an essential technique to improve computation efficiency in ...
Comparing with enormous research achievements targeting better image
cla...
Much of the recent progress made in image classification research can be...
The inference structures and computational complexity of existing deep n...
Commodity OS kernels have broad attack surfaces due to the large code ba...
Commodity OS kernels are known to have broad attack surfaces due to the ...
All the state-of-the-art rowhammer attacks can break the MMU-enforced
in...
While deeper and wider neural networks are actively pushing the performa...
Human pose estimation using deep neural networks aims to map input image...