Picture for Surya Nepal

Surya Nepal

A Comprehensive Survey on Community Detection with Deep Learning

Add code
May 26, 2021
Figure 1 for A Comprehensive Survey on Community Detection with Deep Learning
Figure 2 for A Comprehensive Survey on Community Detection with Deep Learning
Figure 3 for A Comprehensive Survey on Community Detection with Deep Learning
Figure 4 for A Comprehensive Survey on Community Detection with Deep Learning
Viaarxiv icon

RAIDER: Reinforcement-aided Spear Phishing Detector

Add code
May 17, 2021
Figure 1 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 2 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 3 for RAIDER: Reinforcement-aided Spear Phishing Detector
Figure 4 for RAIDER: Reinforcement-aided Spear Phishing Detector
Viaarxiv icon

Robust Training Using Natural Transformation

Add code
May 10, 2021
Figure 1 for Robust Training Using Natural Transformation
Figure 2 for Robust Training Using Natural Transformation
Figure 3 for Robust Training Using Natural Transformation
Figure 4 for Robust Training Using Natural Transformation
Viaarxiv icon

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

Add code
May 03, 2021
Figure 1 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 2 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 3 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 4 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Viaarxiv icon

Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning

Add code
Apr 27, 2021
Figure 1 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Figure 2 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Figure 3 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Figure 4 for Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning
Viaarxiv icon

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Add code
Mar 03, 2021
Figure 1 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 2 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 3 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Figure 4 for Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Viaarxiv icon

Token-Modification Adversarial Attacks for Natural Language Processing: A Survey

Add code
Mar 01, 2021
Figure 1 for Token-Modification Adversarial Attacks for Natural Language Processing: A Survey
Figure 2 for Token-Modification Adversarial Attacks for Natural Language Processing: A Survey
Viaarxiv icon

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN

Add code
Jan 12, 2021
Figure 1 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 2 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 3 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 4 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Viaarxiv icon

HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios

Add code
Dec 14, 2020
Figure 1 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Figure 2 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Figure 3 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Figure 4 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Viaarxiv icon

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

Add code
Oct 08, 2020
Figure 1 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 2 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 3 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 4 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Viaarxiv icon