Picture for C Krishna Mohan

C Krishna Mohan

Minimizing Energy Costs in Deep Learning Model Training: The Gaussian Sampling Approach

Add code
Jun 11, 2024
Viaarxiv icon

Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning

Add code
Apr 05, 2024
Viaarxiv icon

ACLNet: An Attention and Clustering-based Cloud Segmentation Network

Add code
Jul 13, 2022
Figure 1 for ACLNet: An Attention and Clustering-based Cloud Segmentation Network
Figure 2 for ACLNet: An Attention and Clustering-based Cloud Segmentation Network
Figure 3 for ACLNet: An Attention and Clustering-based Cloud Segmentation Network
Figure 4 for ACLNet: An Attention and Clustering-based Cloud Segmentation Network
Viaarxiv icon

WaferSegClassNet -- A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects

Add code
Jul 03, 2022
Figure 1 for WaferSegClassNet -- A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects
Figure 2 for WaferSegClassNet -- A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects
Figure 3 for WaferSegClassNet -- A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects
Figure 4 for WaferSegClassNet -- A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects
Viaarxiv icon

Monte Carlo DropBlock for Modelling Uncertainty in Object Detection

Add code
Aug 08, 2021
Figure 1 for Monte Carlo DropBlock for Modelling Uncertainty in Object Detection
Figure 2 for Monte Carlo DropBlock for Modelling Uncertainty in Object Detection
Figure 3 for Monte Carlo DropBlock for Modelling Uncertainty in Object Detection
Figure 4 for Monte Carlo DropBlock for Modelling Uncertainty in Object Detection
Viaarxiv icon

Black-box Adversarial Attacks in Autonomous Vehicle Technology

Add code
Jan 15, 2021
Figure 1 for Black-box Adversarial Attacks in Autonomous Vehicle Technology
Figure 2 for Black-box Adversarial Attacks in Autonomous Vehicle Technology
Figure 3 for Black-box Adversarial Attacks in Autonomous Vehicle Technology
Figure 4 for Black-box Adversarial Attacks in Autonomous Vehicle Technology
Viaarxiv icon