Picture for Marcello Pelillo

Marcello Pelillo

Boosting CNN-based Handwriting Recognition Systems with Learnable Relaxation Labeling

Add code
Sep 09, 2024
Viaarxiv icon

Understanding XAI Through the Philosopher's Lens: A Historical Perspective

Add code
Jul 26, 2024
Viaarxiv icon

$σ$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

Add code
Feb 02, 2024
Viaarxiv icon

Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

Add code
Jul 01, 2023
Viaarxiv icon

Reassembling Broken Objects using Breaking Curves

Add code
Jun 05, 2023
Viaarxiv icon

Multi-Phase Relaxation Labeling for Square Jigsaw Puzzle Solving

Add code
Mar 26, 2023
Viaarxiv icon

Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding

Add code
Sep 08, 2022
Figure 1 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Figure 2 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Figure 3 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Figure 4 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Viaarxiv icon

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

Add code
May 04, 2022
Figure 1 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 2 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 3 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 4 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Viaarxiv icon

Machine Learning Security against Data Poisoning: Are We There Yet?

Add code
Apr 12, 2022
Figure 1 for Machine Learning Security against Data Poisoning: Are We There Yet?
Figure 2 for Machine Learning Security against Data Poisoning: Are We There Yet?
Figure 3 for Machine Learning Security against Data Poisoning: Are We There Yet?
Viaarxiv icon

Energy-Latency Attacks via Sponge Poisoning

Add code
Apr 11, 2022
Figure 1 for Energy-Latency Attacks via Sponge Poisoning
Figure 2 for Energy-Latency Attacks via Sponge Poisoning
Figure 3 for Energy-Latency Attacks via Sponge Poisoning
Figure 4 for Energy-Latency Attacks via Sponge Poisoning
Viaarxiv icon