Deep learning models have demonstrated remarkable capabilities in learni...
This paper presents a novel backdoor attack called IMPlicit BackdOor Att...
Convolutional Neural Networks (CNNs) have achieved outstanding performan...
This paper proposes a straightforward and cost-effective approach to ass...
Explainability of intelligent models has been garnering increasing atten...
Machine learning models that are overfitted/overtrained are more vulnera...
This paper establishes a novel evaluation framework for assessing the
pe...
Object detection problem solving has developed greatly within the past f...
We aim for image-based novelty detection. Despite considerable progress,...
Social media plays a significant role in sharing essential information, ...
Sign Language is the dominant form of communication language used in the...
Machine learning models often encounter samples that are diverged from t...
Zero-Shot Learning (ZSL) has rapidly advanced in recent years. Towards
o...
Sign Language is the dominant yet non-primary form of communication lang...
This paper presents a practical and simple yet efficient method to
effec...
Classical deep neural networks are limited in their ability to learn fro...
Video anomaly detection has proved to be a challenging task owing to its...
The considerable significance of Anomaly Detection (AD) problem has rece...
In this paper, we propose a novel solution to reduce the computational
c...
This paper proposes an ensemble learning model that is resistant to
adve...
In this paper, we propose a novel method for irregularity detection. Pre...
In this paper, we propose a novel method for irregularity detection. Pre...
This paper presents a novel method for remote heart rate (HR) estimation...
In this paper, we propose Code-Bridged Classifier (CBC), a framework for...
Intrusion Detection System (IDS) is one of the most effective solutions ...
In this paper, we propose a novel self-supervised representation learnin...
In this paper, we present a simple yet efficient approach for video
repr...
This paper presents a simple yet efficient method for an anomaly-based
I...
This paper presents an accurate method for verifying online signatures. ...
This paper gives an overview on semantic segmentation consists of an
exp...
Real-time detection of irregularities in visual data is very invaluable ...
Novelty detection is the process of identifying the observation(s) that
...
Major winning Convolutional Neural Networks (CNNs), such as VGGNet, ResN...
The detection of abnormal behaviours in crowded scenes has to deal with ...
Major winning Convolutional Neural Networks (CNNs), such as AlexNet, VGG...
This paper presents a novel method to involve both spatial and temporal
...
One important application of the Wireless Sensor Network(WSN) is target
...
Biometrics systems have been used in a wide range of applications and ha...