|
|
|
Zahid Masood, Muhammad Usama, Shahroz Khan, Konstantinos Kostas and Panagiotis D. Kaklis
Generative models offer design diversity but tend to be computationally expensive, while non-generative models are computationally cost-effective but produce less diverse and often invalid designs. However, the limitations of non-generative models can be...
ver más
|
|
|
|
|
|
|
Danilo Pau, Andrea Pisani and Antonio Candelieri
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ...
ver más
|
|
|
|
|
|
|
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho...
ver más
|
|
|
|
|
|
|
Amani Alqarni and Hamoud Aljamaan
Software defect prediction is an active research area. Researchers have proposed many approaches to overcome the imbalanced defect problem and build highly effective machine learning models that are not biased towards the majority class. Generative adver...
ver más
|
|
|
|
|
|
|
Zuwei Tan, Runze Li and Yufei Zhang
The inlet is one of the most important components of a hypersonic vehicle. The design and optimization of the hypersonic inlet is of great significance to the research and development of hypersonic vehicles. In recent years, artificial intelligence techn...
ver más
|
|
|
|
|
|
|
Maryam Omar, Hafeez Ur Rehman, Omar Bin Samin, Moutaz Alazab, Gianfranco Politano and Alfredo Benso
Text-to-image synthesis is one of the most critical and challenging problems of generative modeling. It is of substantial importance in the area of automatic learning, especially for image creation, modification, analysis and optimization. A number of wo...
ver más
|
|
|
|
|
|
|
Saqib Ali, Sana Ashraf, Muhammad Sohaib Yousaf, Shazia Riaz and Guojun Wang
The successful outcomes of deep learning (DL) algorithms in diverse fields have prompted researchers to consider backdoor attacks on DL models to defend them in practical applications. Adversarial examples could deceive a safety-critical system, which co...
ver más
|
|
|
|
|
|
|
Sai Sambasiva Rao Bairaboina and Srinivasa Rao Battula
White blood cells (WBCs) must be evaluated to determine how well the human immune system performs. Abnormal WBC counts may indicate malignancy, tuberculosis, severe anemia, cancer, and other serious diseases. To get an early diagnosis and to check if WBC...
ver más
|
|
|
|
|
|
|
Dejian Guan, Wentao Zhao and Xiao Liu
Recent studies show that deep neural networks (DNNs)-based object recognition algorithms overly rely on object textures rather than global object shapes, and DNNs are also vulnerable to human-less perceptible adversarial perturbations. Based on these two...
ver más
|
|
|
|
|
|
|
Yun Sha, Zhaoyu Chen, Xuejun Liu, Yong Yan, Chenchen Du, Jiayi Liu and Ranran Han
The scarcity of attack samples is the bottleneck problem of anomaly detection of underlying business data in the industrial control system. Predecessors have done a lot of research on temporal data generation, but most of them are not suitable for indust...
ver más
|
|
|
|