Picture for Derek Abbott

Derek Abbott

Repurposing and Evaluating the (In)Feasibility of Dataset Poisoning enabled Watermarking for Contrastive Learning

Add code
May 03, 2026
Viaarxiv icon

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Sep 06, 2022
Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

Linear measurements from nonlinear sensors: identifying distortion with incidental noise

Add code
May 09, 2022
Figure 1 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 2 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 3 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Figure 4 for Linear measurements from nonlinear sensors: identifying distortion with incidental noise
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Jan 21, 2022
Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

NTD: Non-Transferability Enabled Backdoor Detection

Add code
Nov 22, 2021
Figure 1 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 2 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 3 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 4 for NTD: Non-Transferability Enabled Backdoor Detection
Viaarxiv icon

Quantization Backdoors to Deep Learning Models

Add code
Aug 20, 2021
Figure 1 for Quantization Backdoors to Deep Learning Models
Figure 2 for Quantization Backdoors to Deep Learning Models
Figure 3 for Quantization Backdoors to Deep Learning Models
Figure 4 for Quantization Backdoors to Deep Learning Models
Viaarxiv icon

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

Add code
May 11, 2021
Figure 1 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 2 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 3 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 4 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Viaarxiv icon

A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity

Add code
Mar 30, 2013
Figure 1 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 2 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 3 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Figure 4 for A Neuromorphic VLSI Design for Spike Timing and Rate Based Synaptic Plasticity
Viaarxiv icon

Efficient Design of Triplet Based Spike-Timing Dependent Plasticity

Add code
Apr 08, 2012
Figure 1 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 2 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 3 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Figure 4 for Efficient Design of Triplet Based Spike-Timing Dependent Plasticity
Viaarxiv icon

Optimizing genetic algorithm strategies for evolving networks

Add code
Apr 07, 2004
Viaarxiv icon