Deep neural networks (DNNs) have been widely used in many important applications, such as computer vision, speaker recognition, natural language processing, etc. Despite their current popular adoptions, DNN models are facing security and efficiency issues when considering their practical use in many critical and resource limited systems. In particular, the vulnerability of DNN models under the adversarial attack, an emerging attack approach that only performs imperceptible perturbation on the input, has became a significant potential challenge that hinders the further deployment of deep learning in real-world applications. As for the model efficiency, especially for the Transformer model which has higher capacity among other architectures, ...
Voice-user interface (VUI) has exploded in popularity due to the recent advances in automatic speech...
Recent years have witnessed the remarkable success of deep neural network (DNN) models spanning a wi...
Abstract This article proposes a novel yet efficient defence method against adversarial attack(er)s ...
Deep neural networks (DNNs) serve as a backbone of many image, language and speech processing system...
Deep neural networks (DNNs) serve as a backbone of many image, language and speech processing system...
Deep Neural Networks (DNNs) have transformed the field of multimedia generation and recognition by r...
Deep neural networks (DNNs) continue to demonstrate superior generalization performance in an increa...
Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances i...
Deep Neural Networks (DNNs) have made many breakthroughs in different areas of artificial intelligen...
Despite superior accuracy on most vision recognition tasks, deep neural networks are susceptible to ...
Adversarial attacks deceive deep neural network models by adding imperceptibly small but well-design...
Deep Neural Networks (DNNs) have achieved great success in a wide range of applications, such as ima...
Deep neural networks (DNNs) provide excellent performance in image recognition, speech recognition, ...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Voice-user interface (VUI) has exploded in popularity due to the recent advances in automatic speech...
Recent years have witnessed the remarkable success of deep neural network (DNN) models spanning a wi...
Abstract This article proposes a novel yet efficient defence method against adversarial attack(er)s ...
Deep neural networks (DNNs) serve as a backbone of many image, language and speech processing system...
Deep neural networks (DNNs) serve as a backbone of many image, language and speech processing system...
Deep Neural Networks (DNNs) have transformed the field of multimedia generation and recognition by r...
Deep neural networks (DNNs) continue to demonstrate superior generalization performance in an increa...
Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances i...
Deep Neural Networks (DNNs) have made many breakthroughs in different areas of artificial intelligen...
Despite superior accuracy on most vision recognition tasks, deep neural networks are susceptible to ...
Adversarial attacks deceive deep neural network models by adding imperceptibly small but well-design...
Deep Neural Networks (DNNs) have achieved great success in a wide range of applications, such as ima...
Deep neural networks (DNNs) provide excellent performance in image recognition, speech recognition, ...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neu...
Voice-user interface (VUI) has exploded in popularity due to the recent advances in automatic speech...
Recent years have witnessed the remarkable success of deep neural network (DNN) models spanning a wi...
Abstract This article proposes a novel yet efficient defence method against adversarial attack(er)s ...