Picture for Huili Chen

Huili Chen

Integrating Flow Theory and Adaptive Robot Roles: A Conceptual Model of Dynamic Robot Role Adaptation for the Enhanced Flow Experience in Long-term Multi-person Human-Robot Interactions

Add code
Jan 05, 2024
Viaarxiv icon

Comparative Analysis of Deep Learning Models for Brand Logo Classification in Real-World Scenarios

Add code
May 20, 2023
Viaarxiv icon

Joint Engagement Classification using Video Augmentation Techniques for Multi-person Human-robot Interaction

Add code
Dec 28, 2022
Viaarxiv icon

PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications

Add code
Aug 08, 2022
Figure 1 for PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Figure 2 for PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Figure 3 for PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Figure 4 for PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications
Viaarxiv icon

Self-Aware Personalized Federated Learning

Add code
Apr 17, 2022
Figure 1 for Self-Aware Personalized Federated Learning
Figure 2 for Self-Aware Personalized Federated Learning
Figure 3 for Self-Aware Personalized Federated Learning
Figure 4 for Self-Aware Personalized Federated Learning
Viaarxiv icon

AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection

Add code
Apr 12, 2022
Figure 1 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Figure 2 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Figure 3 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Figure 4 for AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection
Viaarxiv icon

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Add code
Apr 08, 2022
Figure 1 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Figure 2 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Figure 3 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Figure 4 for An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks
Viaarxiv icon

Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection

Add code
Feb 21, 2022
Figure 1 for Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection
Figure 2 for Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection
Figure 3 for Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection
Figure 4 for Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection
Viaarxiv icon

Toward Designing Social Human-Robot Interactions for Deep Space Exploration

Add code
May 18, 2021
Figure 1 for Toward Designing Social Human-Robot Interactions for Deep Space Exploration
Viaarxiv icon

ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

Add code
Mar 23, 2021
Figure 1 for ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning
Figure 2 for ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning
Figure 3 for ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning
Figure 4 for ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning
Viaarxiv icon