Rethinking model ensemble in transfer-based adversarial attacks
It is widely recognized that deep learning models lack robustness to adversarial examples.
An intriguing property of adversarial examples is that they can transfer across different …
An intriguing property of adversarial examples is that they can transfer across different …
Clamp-vit: Contrastive data-free learning for adaptive post-training quantization of vits
We present CLAMP-ViT, a data-free post-training quantization method for vision
transformers (ViTs). We identify the limitations of recent techniques, notably their inability to …
transformers (ViTs). We identify the limitations of recent techniques, notably their inability to …
On the duality between sharpness-aware minimization and adversarial training
Adversarial Training (AT), which adversarially perturb the input samples during training, has
been acknowledged as one of the most effective defenses against adversarial attacks, yet …
been acknowledged as one of the most effective defenses against adversarial attacks, yet …
Enhanced damage segmentation in RC components using pyramid Haar wavelet downsampling and attention U-net
W Wang, L Li, Z Qu, X Yang - Automation in Construction, 2024 - Elsevier
Damage identification in post-earthquake reinforced concrete (RC) structures based on
semantic segmentation has been recognized as a promising approach for rapid and non …
semantic segmentation has been recognized as a promising approach for rapid and non …
Digital twin-enhanced deep reinforcement learning for resource management in networks slicing
Network slicing-based communication systems can dynamically and efficiently allocate
resources for diversified services. However, due to the limitation of the network interface on …
resources for diversified services. However, due to the limitation of the network interface on …
From fitness landscapes to explainable AI and back
We consider and discuss the ways in which search landscapes might contribute to the future
of explainable artificial intelligence (XAI), and vice versa. Landscapes are typically used to …
of explainable artificial intelligence (XAI), and vice versa. Landscapes are typically used to …
Elucidating the Design Space of Dataset Condensation
Dataset condensation, a concept within data-centric learning, efficiently transfers critical
attributes from an original dataset to a synthetic version, maintaining both diversity and …
attributes from an original dataset to a synthetic version, maintaining both diversity and …
Adversarial Attacks of Vision Tasks in the Past 10 Years: A Survey
Adversarial attacks, which manipulate input data to undermine model availability and
integrity, pose significant security threats during machine learning inference. With the advent …
integrity, pose significant security threats during machine learning inference. With the advent …
Boosting adversarial attack with similar target
Deep neural networks are vulnerable to adversarial examples, posing a threat to the models'
applications and raising security concerns. An intriguing property of adversarial examples is …
applications and raising security concerns. An intriguing property of adversarial examples is …
rECGnition_v1. 0: Arrhythmia detection using cardiologist-inspired multi-modal architecture incorporating demographic attributes in ECG
A substantial amount of variability in ECG manifested due to patient characteristics hinders
the adoption of automated analysis algorithms in clinical practice. None of the ECG …
the adoption of automated analysis algorithms in clinical practice. None of the ECG …