Zobrazeno 1 - 10
of 43
pro vyhledávání: '"Kounavis, Michael"'
Machine learning systems such as large scale recommendation systems or natural language processing systems are usually trained on billions of training points and are associated with hundreds of billions or trillions of parameters. Improving the learn
Externí odkaz:
http://arxiv.org/abs/2305.16094
Autor:
Cornelius, Cory, Das, Nilaksh, Chen, Shang-Tse, Chen, Li, Kounavis, Michael E., Chau, Duen Horng
In this appraisal paper, we evaluate the efficacy of SHIELD, a compression-based defense framework for countering adversarial attacks on image classification models, which was published at KDD 2018. Here, we consider alternative threat models not stu
Externí odkaz:
http://arxiv.org/abs/1902.00541
Autor:
Das, Nilaksh, Shanbhogue, Madhuri, Chen, Shang-Tse, Chen, Li, Kounavis, Michael E., Chau, Duen Horng
Adversarial machine learning research has recently demonstrated the feasibility to confuse automatic speech recognition (ASR) models by introducing acoustically imperceptible perturbations to audio samples. To help researchers and practitioners gain
Externí odkaz:
http://arxiv.org/abs/1805.11852
Autor:
Das, Nilaksh, Shanbhogue, Madhuri, Chen, Shang-Tse, Hohman, Fred, Li, Siwei, Chen, Li, Kounavis, Michael E., Chau, Duen Horng
The rapidly growing body of research in adversarial machine learning has demonstrated that deep neural networks (DNNs) are highly vulnerable to adversarially generated images. This underscores the urgent need for practical defense that can be readily
Externí odkaz:
http://arxiv.org/abs/1802.06816
Autor:
Das, Nilaksh, Shanbhogue, Madhuri, Chen, Shang-Tse, Hohman, Fred, Chen, Li, Kounavis, Michael E., Chau, Duen Horng
Deep neural networks (DNNs) have achieved great success in solving a variety of machine learning (ML) problems, especially in the domain of image recognition. However, recent research showed that DNNs can be highly vulnerable to adversarially generat
Externí odkaz:
http://arxiv.org/abs/1705.02900
Publikováno v:
In Computer Communications 1 July 2020 160:815-846
Publikováno v:
In Computer Networks 1999 31(7):741-765
Autor:
Gueron, Shay1 shay.gueron@intel.com, Kounavis, Michael E.1 michael.e.kounavis@intel.com
Publikováno v:
Intel Technology Journal. Jun2009, Vol. 13 Issue 2, p52-65. 14p. 3 Diagrams, 5 Charts.
Autor:
Walker, Jesse1 jesse.walker@intel.com, Kounavis, Michael1 michael.e.kounavis@intel.com, Gueron, Shay1 shay.gueron@intel.com, Graunke, Gary1 gary.graunke@intel.com
Publikováno v:
Intel Technology Journal. Jun2009, Vol. 13 Issue 2, p80-95. 16p. 4 Diagrams.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.