Picture for Derek Abbott

Derek Abbott

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Sep 06, 2022
Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

Linear measurements from nonlinear sensors: identifying distortion with incidental noise

Add code
May 09, 2022
Figure 1 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 2 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 3 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 4 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Jan 21, 2022
Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

NTD: Non-Transferability Enabled Backdoor Detection

Add code
Nov 22, 2021
Figure 1 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 2 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 3 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 4 for NTD: Non-Transferability Enabled Backdoor Detection
Viaarxiv icon

Quantization Backdoors to Deep Learning Models

Add code
Aug 20, 2021
Figure 1 for Quantization Backdoors to Deep Learning Models
Figure 2 for Quantization Backdoors to Deep Learning Models
Figure 3 for Quantization Backdoors to Deep Learning Models
Figure 4 for Quantization Backdoors to Deep Learning Models
Viaarxiv icon

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

Add code
May 11, 2021
Figure 1 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 2 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 3 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 4 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Viaarxiv icon

A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity

Add code
Mar 30, 2013
Figure 1 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 2 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 3 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 4 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Viaarxiv icon

Efficient Design of Triplet Based Spike-Timing Dependent Plasticity

Add code
Apr 08, 2012
Figure 1 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 2 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 3 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 4 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Viaarxiv icon

Optimizing genetic algorithm strategies for evolving networks

Add code
Apr 07, 2004
Viaarxiv icon

Exploring tradeoffs in pleiotropy and redundancy using evolutionary computing

Add code
Apr 07, 2004
Viaarxiv icon