Automated Classification of Model Errors on ImageNet. (arXiv:2401.02430v1 [cs.CV]) http://arxiv.org/abs/2401.02430
Execution time budget assignment for mixed criticality systems. (arXiv:2401.02431v1 [cs.PF]) http://arxiv.org/abs/2401.02431
Negation and Identity in a Modal Mode Theory. (arXiv:2401.01893v1 [cs.LO]) http://arxiv.org/abs/2401.01893
A Robust Adversary Detection-Deactivation Method for Metaverse-oriented Collaborative Deep Learning. (arXiv:2401.01895v1 [cs.CR]) http://arxiv.org/abs/2401.01895
Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification. (arXiv:2401.01896v1 [cs.CR]) http://arxiv.org/abs/2401.01896
Machine-learning-based particle identification with missing data. (arXiv:2401.01905v1 [physics.ins-det]) http://arxiv.org/abs/2401.01905
On the relevance of the Godot Engine in the indie game development industry. (arXiv:2401.01909v1 [cs.OH]) http://arxiv.org/abs/2401.01909
Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A Pilot Study on MedCLIP. (arXiv:2401.01911v1 [cs.CV]) http://arxiv.org/abs/2401.01911
Shrinking Your TimeStep: Towards Low-Latency Neuromorphic Object Recognition with Spiking Neural Network. (arXiv:2401.01912v1 [cs.CV]) http://arxiv.org/abs/2401.01912
Scattering from time-modulated subwavelength resonators. (arXiv:2401.01914v1 [math-ph]) http://arxiv.org/abs/2401.01914
AstroLLaMA-Chat: Scaling AstroLLaMA with Conversational and Diverse Datasets. (arXiv:2401.01916v1 [astro-ph.IM]) http://arxiv.org/abs/2401.01916
Distilling Temporal Knowledge with Masked Feature Reconstruction for 3D Object Detection. (arXiv:2401.01918v1 [cs.CV]) http://arxiv.org/abs/2401.01918
ATLASv2: ATLAS Attack Engagements, Version 2. (arXiv:2401.01341v1 [cs.CR]) http://arxiv.org/abs/2401.01341
Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection. (arXiv:2401.01342v1 [cs.CR]) http://arxiv.org/abs/2401.01342
IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection. (arXiv:2401.01343v1 [cs.CR]) http://arxiv.org/abs/2401.01343
SD-WAN over MPLS: A Comprehensive Performance Analysis and Security with Insights into the Future of SD-WAN. (arXiv:2401.01344v1 [cs.CR]) http://arxiv.org/abs/2401.01344
A Synthetic Modal Generation of Additive Manufacturing Roughness Surfaces from Images. (arXiv:2401.01345v1 [cs.CV]) http://arxiv.org/abs/2401.01345
The Anatomy Spread of Online Opinion Polarization: The Pivotal Role of Super-Spreaders in Social Networks. (arXiv:2401.01349v1 [physics.soc-ph]) http://arxiv.org/abs/2401.01349
The Boomerang protocol: A Decentralised Privacy-Preserving Verifiable Incentive Protocol. (arXiv:2401.01353v1 [cs.CR]) http://arxiv.org/abs/2401.01353
Efficient Indexing of Meta-Data (Extracted from Educational Videos). (arXiv:2401.01356v1 [cs.IR]) http://arxiv.org/abs/2401.01356
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview