Now showing items 1-2 of 2

    • Adversarial Defense Using Partial Pseudorandom Encryption 

      Kalgutkar, Amruta (2021)
      Machine Learning models like Deep neural networks are vulnerable to adversarial attacks. Carefully crafted adversarial examples force a learned classifier to misclassify the input which can be correctly classified by a ...
    • Image ranking based on clustering 

      Sharma, Monika (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high feature similarities to the query may be very ...