We target the problem of detecting trojans or backdoors in deep learning models that behave normally with typical inputs but produce specific incorrect predictions for inputs poisoned with a trojan trigger.
Such models behave normally with typical inputs but produce specific incorrect predictions for inputs poisoned with a trojan trigger.
The pervasiveness of deep neural networks (DNNs) in technology, matched with the ubiquity of cloud-based training and transfer learning, is giving rise to a new frontier for cybersecurity whereby `str
The wide adaption of 3d point-cloud data in safety-critical applications suchas autonomous driving makes adversarial samples a real threat.
Existing adversarial attacks on point clouds achieve high success rates but modify a large number of points, which is usually difficult to do in real-lifescenarios.
Edge computing offers an additional layer of compute infrastructure closer to the data source before raw data from privacy-sensitive and performance-critical applications is transferred to a cloud dat
Mitigating the dependence on spurious correlations present in the training
dataset is a quickly emerging and important topic of deep learning. Recent
approaches include priors on the feature attributi
The supervised training of deep neural networks (DNNs) by noisy labels has
been studied extensively in image classification but much less in image
segmentation. So far, our understanding of the learni
Fluorescence microscopy images play the critical role of capturing spatial or
spatiotemporal information of biomedical processes in life sciences. Their
simple structures and semantics provide unique
The study of adversarial vulnerabilities of deep neural networks (DNNs) has
progressed rapidly. Existing attacks require either internal access (to the
architecture, parameters, or training set of the
A common strategy to train deep neural networks (DNNs) is to use very large
architectures and to train them until they (almost) achieve zero training
error. Empirically observed good generalization pe
In the field of autonomous driving and robotics, point clouds are showing
their excellent real-time performance as raw data from most of the mainstream
3D sensors. Therefore, point cloud neural networ
Ensembles of Deep Neural Networks (DNNs) have achieved qualitative
predictions but they are computing and memory intensive. Therefore, the demand
is growing to make them answer a heavy workload of req
Deep neural networks (DNNs) have recently been achieving state-of-the-art
performance on a variety of pattern-recognition tasks, most notably visual
classification problems. Given that DNNs are now ab
In general, Deep Neural Networks (DNNs) are evaluated by the generalization
performance measured on unseen data excluded from the training phase. Along
with the development of DNNs, the generalization
We theoretically discuss why deep neural networks (DNNs) performs better than
other models in some cases by investigating statistical properties of DNNs for
non-smooth functions. While DNNs have empir
Deep artificial neural networks (DNNs) have moved to the forefront of medical
image analysis due to their success in classification, segmentation, and
detection challenges. A principal challenge in la
Automatically detecting the positions of key-points (e.g., facial key-points
or finger key-points) in an image is an essential problem in many applications,
such as driver's gaze detection and drowsin
Multiplication (e.g., convolution) is arguably a cornerstone of modern deep
neural networks (DNNs). However, intensive multiplications cause expensive
resource costs that challenge DNNs' deployment on
Gradient-based meta-learning (GBML) with deep neural nets (DNNs) has become a
popular approach for few-shot learning. However, due to the non-convexity of
DNNs and the bi-level optimization in GBML, t
Deep neural networks (DNNs) have become essential for processing the vast
amounts of aerial imagery collected using earth-observing satellite platforms.
However, DNNs are vulnerable towards adversaria