Alert button
Picture for Derek Abbott

Derek Abbott

Alert button

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Bookmark button
Alert button
Sep 06, 2022
Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

Linear measurements from nonlinear sensors: identifying distortion with incidental noise

Add code
Bookmark button
Alert button
May 09, 2022
Lachlan J. Gunn, Andrew Allison, Derek Abbott

Figure 1 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 2 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 3 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 4 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Bookmark button
Alert button
Jan 21, 2022
Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

NTD: Non-Transferability Enabled Backdoor Detection

Add code
Bookmark button
Alert button
Nov 22, 2021
Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott

Figure 1 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 2 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 3 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 4 for NTD: Non-Transferability Enabled Backdoor Detection
Viaarxiv icon

Quantization Backdoors to Deep Learning Models

Add code
Bookmark button
Alert button
Aug 20, 2021
Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said Al-Sarawi, Derek Abbott

Figure 1 for Quantization Backdoors to Deep Learning Models
Figure 2 for Quantization Backdoors to Deep Learning Models
Figure 3 for Quantization Backdoors to Deep Learning Models
Figure 4 for Quantization Backdoors to Deep Learning Models
Viaarxiv icon

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

Add code
Bookmark button
Alert button
May 11, 2021
Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi

Figure 1 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 2 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 3 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 4 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Viaarxiv icon

A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity

Add code
Bookmark button
Alert button
Mar 30, 2013
Mostafa Rahimi Azghadi, Said Al-Sarawi, Derek Abbott, Nicolangelo Iannella

Figure 1 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 2 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 3 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 4 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Viaarxiv icon

Efficient Design of Triplet Based Spike-Timing Dependent Plasticity

Add code
Bookmark button
Alert button
Apr 08, 2012
Mostafa Rahimi Azghadi, Said Al-Sarawi, Nicolangelo Iannella, Derek Abbott

Figure 1 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 2 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 3 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 4 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Viaarxiv icon

Optimizing genetic algorithm strategies for evolving networks

Add code
Bookmark button
Alert button
Apr 07, 2004
Matthew J. Berryman, Andrew Allison, Derek Abbott

Viaarxiv icon

Exploring tradeoffs in pleiotropy and redundancy using evolutionary computing

Add code
Bookmark button
Alert button
Apr 07, 2004
Matthew J. Berryman, Wei-Li Khoo, Hiep Nguyen, Erin O'Neill, Andrew Allison, Derek Abbott

Viaarxiv icon