Model Performance Evaluation

mm-Pose: Real-Time Human Skeletal Posture Estimation using mmWave Radars and CNNs

Authors: Arindam Sengupta, Feng Jin, Renyuan Zhang, Siyang Cao | Published: 2019-11-21
Model Performance Evaluation
Radar Technology
Deep Learning

The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities

Authors: Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin | Published: 2019-11-21
Hyperparameter Optimization
Model Performance Evaluation
Feature Engineering

Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation

Authors: Alexander Levine, Soheil Feizi | Published: 2019-11-21
Model Performance Evaluation
Numerical Stability Issues
Adversarial Attack Methods

Fine-grained Synthesis of Unrestricted Adversarial Examples

Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22
Model Performance Evaluation
Model Design
Adversarial Attack Methods

Deep Minimax Probability Machine

Authors: Lirong He, Ziyi Guo, Kaizhu Huang, Zenglin Xu | Published: 2019-11-20
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Generate (non-software) Bugs to Fool Classifiers

Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Towards non-toxic landscapes: Automatic toxic comment detection using DNN

Authors: Ashwin Geet D'Sa, Irina Illina, Dominique Fohr | Published: 2019-11-19 | Updated: 2020-09-16
Class Imbalance
Model Performance Evaluation
Adversarial Attack Methods

A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories

Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18
Backdoor Attack
Model Performance Evaluation
Adversarial Attack Methods

Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning

Authors: Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent | Published: 2019-11-18
Program Understanding
Model Performance Evaluation
Role of Machine Learning

Exploiting Human Social Cognition for the Detection of Fake and Fraudulent Faces via Memory Networks

Authors: Tharindu Fernando, Clinton Fookes, Simon Denman, Sridha Sridharan | Published: 2019-11-17
Model Performance Evaluation
Attention Mechanism
Image Forensics