Alert button
Picture for Marthie Grobler

Marthie Grobler

Alert button

Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches

Add code
Bookmark button
Alert button
Feb 18, 2022
Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor

Figure 1 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Figure 2 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Figure 3 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Figure 4 for Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches
Viaarxiv icon

Robust Training Using Natural Transformation

Add code
Bookmark button
Alert button
May 10, 2021
Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore

Figure 1 for Robust Training Using Natural Transformation
Figure 2 for Robust Training Using Natural Transformation
Figure 3 for Robust Training Using Natural Transformation
Figure 4 for Robust Training Using Natural Transformation
Viaarxiv icon

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

Add code
Bookmark button
Alert button
May 03, 2021
Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba

Figure 1 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 2 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 3 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 4 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Viaarxiv icon

Adversarial Defense by Latent Style Transformations

Add code
Bookmark button
Alert button
Jun 17, 2020
Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen

Figure 1 for Adversarial Defense by Latent Style Transformations
Figure 2 for Adversarial Defense by Latent Style Transformations
Figure 3 for Adversarial Defense by Latent Style Transformations
Figure 4 for Adversarial Defense by Latent Style Transformations
Viaarxiv icon

Defending Adversarial Attacks via Semantic Feature Manipulation

Add code
Bookmark button
Alert button
Feb 03, 2020
Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen

Figure 1 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 2 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 3 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 4 for Defending Adversarial Attacks via Semantic Feature Manipulation
Viaarxiv icon

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning

Add code
Bookmark button
Alert button
Jan 18, 2020
Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler

Figure 1 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 2 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 3 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 4 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Viaarxiv icon

Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models

Add code
Bookmark button
Alert button
Jan 10, 2020
Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen

Figure 1 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 2 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 3 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 4 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Viaarxiv icon

Generating Semantic Adversarial Examples via Feature Manipulation

Add code
Bookmark button
Alert button
Jan 06, 2020
Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler

Figure 1 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 2 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 3 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 4 for Generating Semantic Adversarial Examples via Feature Manipulation
Viaarxiv icon

Security and Performance Considerations in ROS 2: A Balancing Act

Add code
Bookmark button
Alert button
Sep 24, 2018
Jongkil Kim, Jonathon M. Smereka, Calvin Cheung, Surya Nepal, Marthie Grobler

Figure 1 for Security and Performance Considerations in ROS 2: A Balancing Act
Figure 2 for Security and Performance Considerations in ROS 2: A Balancing Act
Figure 3 for Security and Performance Considerations in ROS 2: A Balancing Act
Figure 4 for Security and Performance Considerations in ROS 2: A Balancing Act
Viaarxiv icon