Now showing items 1-3 of 3

    • Adversarial Defense Using Partial Pseudorandom Encryption 

      Kalgutkar, Amruta (2021)
      Machine Learning models like Deep neural networks are vulnerable to adversarial attacks. Carefully crafted adversarial examples force a learned classifier to misclassify the input which can be correctly classified by a ...
    • Image ranking based on clustering 

      Sharma, Monika (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high feature similarities to the query may be very ...
    • What is my occupation? 

      Zalavadiya, Darshankumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      The facial image of a person contains much rich information like gender, race, age, hairstyle, and other essential pieces of information that are related to a person�s occupation. Predicting or recognizing occupation is a ...