Picture for Muhammad Umer

Muhammad Umer

Hierarchical Deep Reinforcement Learning for Adaptive Resource Management in Integrated Terrestrial and Non-Terrestrial Networks

Add code
Jan 16, 2025
Viaarxiv icon

RIS-Assisted Aerial Non-Terrestrial Networks: An Intelligent Synergy with Deep Reinforcement Learning

Add code
Dec 25, 2024
Viaarxiv icon

Adversary Aware Continual Learning

Add code
Apr 27, 2023
Viaarxiv icon

Contributor-Aware Defenses Against Adversarial Backdoor Attacks

Add code
May 28, 2022
Figure 1 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 2 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 3 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 4 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Viaarxiv icon

False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger

Add code
Feb 09, 2022
Figure 1 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Figure 2 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Figure 3 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Figure 4 for False Memory Formation in Continual Learners Through Imperceptible Backdoor Trigger
Viaarxiv icon

Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models

Add code
Feb 16, 2021
Figure 1 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Figure 2 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Figure 3 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Figure 4 for Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models
Viaarxiv icon

Comparative Analysis of Extreme Verification Latency Learning Algorithms

Add code
Nov 26, 2020
Figure 1 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Figure 2 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Figure 3 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Figure 4 for Comparative Analysis of Extreme Verification Latency Learning Algorithms
Viaarxiv icon

Comparison Analysis of Tree Based and Ensembled Regression Algorithms for Traffic Accident Severity Prediction

Add code
Oct 27, 2020
Figure 1 for Comparison Analysis of Tree Based and Ensembled Regression Algorithms for Traffic Accident Severity Prediction
Figure 2 for Comparison Analysis of Tree Based and Ensembled Regression Algorithms for Traffic Accident Severity Prediction
Figure 3 for Comparison Analysis of Tree Based and Ensembled Regression Algorithms for Traffic Accident Severity Prediction
Figure 4 for Comparison Analysis of Tree Based and Ensembled Regression Algorithms for Traffic Accident Severity Prediction
Viaarxiv icon

Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks

Add code
Feb 17, 2020
Figure 1 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Figure 2 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Figure 3 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Figure 4 for Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks
Viaarxiv icon