mm-Pose: Real-Time Human Skeletal Posture Estimation using mmWave Radars and CNNs Authors: Arindam Sengupta, Feng Jin, Renyuan Zhang, Siyang Cao | Published: 2019-11-21 Model Performance EvaluationRadar TechnologyDeep Learning 2019.11.21 2025.05.28 Literature Database
The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities Authors: Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin | Published: 2019-11-21 Hyperparameter OptimizationModel Performance EvaluationFeature Engineering 2019.11.21 2025.05.28 Literature Database
Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation Authors: Alexander Levine, Soheil Feizi | Published: 2019-11-21 Model Performance EvaluationNumerical Stability IssuesAdversarial Attack Methods 2019.11.21 2025.05.28 Literature Database
Fine-grained Synthesis of Unrestricted Adversarial Examples Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22 Model Performance EvaluationModel DesignAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Deep Minimax Probability Machine Authors: Lirong He, Ziyi Guo, Kaizhu Huang, Zenglin Xu | Published: 2019-11-20 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Generate (non-software) Bugs to Fool Classifiers Authors: Hiromu Yakura, Youhei Akimoto, Jun Sakuma | Published: 2019-11-20 Model Performance EvaluationAdversarial ExampleAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Towards non-toxic landscapes: Automatic toxic comment detection using DNN Authors: Ashwin Geet D'Sa, Irina Illina, Dominique Fohr | Published: 2019-11-19 | Updated: 2020-09-16 Class ImbalanceModel Performance EvaluationAdversarial Attack Methods 2019.11.19 2025.05.28 Literature Database
A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18 Backdoor AttackModel Performance EvaluationAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database
Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning Authors: Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent | Published: 2019-11-18 Program UnderstandingModel Performance EvaluationRole of Machine Learning 2019.11.18 2025.05.28 Literature Database
Exploiting Human Social Cognition for the Detection of Fake and Fraudulent Faces via Memory Networks Authors: Tharindu Fernando, Clinton Fookes, Simon Denman, Sridha Sridharan | Published: 2019-11-17 Model Performance EvaluationAttention MechanismImage Forensics 2019.11.17 2025.05.28 Literature Database