Rethinking model ensemble in transfer-based adversarial attacks

H Chen, Y Zhang, Y Dong, X Yang, H Su… - arxiv preprint arxiv …, 2023 - arxiv.org
It is widely recognized that deep learning models lack robustness to adversarial examples.
An intriguing property of adversarial examples is that they can transfer across different …

Clamp-vit: Contrastive data-free learning for adaptive post-training quantization of vits

A Ramachandran, S Kundu, T Krishna - European Conference on …, 2024 - Springer
We present CLAMP-ViT, a data-free post-training quantization method for vision
transformers (ViTs). We identify the limitations of recent techniques, notably their inability to …

On the duality between sharpness-aware minimization and adversarial training

Y Zhang, H He, J Zhu, H Chen, Y Wang… - arxiv preprint arxiv …, 2024 - arxiv.org
Adversarial Training (AT), which adversarially perturb the input samples during training, has
been acknowledged as one of the most effective defenses against adversarial attacks, yet …

Enhanced damage segmentation in RC components using pyramid Haar wavelet downsampling and attention U-net

W Wang, L Li, Z Qu, X Yang - Automation in Construction, 2024 - Elsevier
Damage identification in post-earthquake reinforced concrete (RC) structures based on
semantic segmentation has been recognized as a promising approach for rapid and non …

Digital twin-enhanced deep reinforcement learning for resource management in networks slicing

Z Zhang, Y Huang, C Zhang, Q Zheng… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Network slicing-based communication systems can dynamically and efficiently allocate
resources for diversified services. However, due to the limitation of the network interface on …

From fitness landscapes to explainable AI and back

SL Thomson, J Adair, AEI Brownlee… - Proceedings of the …, 2023 - dl.acm.org
We consider and discuss the ways in which search landscapes might contribute to the future
of explainable artificial intelligence (XAI), and vice versa. Landscapes are typically used to …

Elucidating the Design Space of Dataset Condensation

S Shao, Z Zhou, H Chen, Z Shen - arxiv preprint arxiv:2404.13733, 2024 - arxiv.org
Dataset condensation, a concept within data-centric learning, efficiently transfers critical
attributes from an original dataset to a synthetic version, maintaining both diversity and …

Adversarial Attacks of Vision Tasks in the Past 10 Years: A Survey

C Zhang, X Xu, J Wu, Z Liu, L Zhou - arxiv preprint arxiv:2410.23687, 2024 - arxiv.org
Adversarial attacks, which manipulate input data to undermine model availability and
integrity, pose significant security threats during machine learning inference. With the advent …

Boosting adversarial attack with similar target

S Zhang, Z Wang, Z Zhou, H Chen - arxiv preprint arxiv:2308.10743, 2023 - arxiv.org
Deep neural networks are vulnerable to adversarial examples, posing a threat to the models'
applications and raising security concerns. An intriguing property of adversarial examples is …

rECGnition_v1. 0: Arrhythmia detection using cardiologist-inspired multi-modal architecture incorporating demographic attributes in ECG

S Srivastava, D Kumar, J Bedi, S Seth… - arxiv preprint arxiv …, 2024 - arxiv.org
A substantial amount of variability in ECG manifested due to patient characteristics hinders
the adoption of automated analysis algorithms in clinical practice. None of the ECG …