Picture for Mohammadreza Mohammadi

Mohammadreza Mohammadi

An explainable machine learning-based approach for analyzing customers' online data to identify the importance of product attributes

Add code
Feb 03, 2024
Viaarxiv icon

Facial Expression Recognition at the Edge: CPU vs GPU vs VPU vs TPU

Add code
May 17, 2023
Viaarxiv icon

Energy-Efficient Deployment of Machine Learning Workloads on Neuromorphic Hardware

Add code
Oct 10, 2022
Figure 1 for Energy-Efficient Deployment of Machine Learning Workloads on Neuromorphic Hardware
Figure 2 for Energy-Efficient Deployment of Machine Learning Workloads on Neuromorphic Hardware
Figure 3 for Energy-Efficient Deployment of Machine Learning Workloads on Neuromorphic Hardware
Figure 4 for Energy-Efficient Deployment of Machine Learning Workloads on Neuromorphic Hardware
Viaarxiv icon

SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks

Add code
Sep 25, 2022
Figure 1 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 2 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 3 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Figure 4 for SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks
Viaarxiv icon

Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization

Add code
Sep 11, 2022
Figure 1 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 2 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 3 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Figure 4 for Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization
Viaarxiv icon

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Add code
Apr 27, 2022
Figure 1 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 2 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 3 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Figure 4 for An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework
Viaarxiv icon

MRAM-based Analog Sigmoid Function for In-memory Computing

Add code
Apr 21, 2022
Figure 1 for MRAM-based Analog Sigmoid Function for In-memory Computing
Figure 2 for MRAM-based Analog Sigmoid Function for In-memory Computing
Figure 3 for MRAM-based Analog Sigmoid Function for In-memory Computing
Figure 4 for MRAM-based Analog Sigmoid Function for In-memory Computing
Viaarxiv icon