Please use this identifier to cite or link to this community:

http://hdl.handle.net/1903/2234

Recent Submissions

  • Machine Learning of Facial Attributes Using Explainable, Secure and Generative Adversarial Networks 

    Samangouei, Pouya (2018)
    "Attributes" are referred to abstractions that humans use to group entities and phenomena that have a common characteristic. In machine learning (ML), attributes are fundamental because they bridge the semantic gap between ...
  • SCAN CHAIN BASED HARDWARE SECURITY 

    Chen, Xi (2018)
    Hardware has become a popular target for attackers to hack into any computing and communication system. Starting from the legendary power analysis attacks discovered 20 years ago to the recent Intel Spectre and Meltdown ...
  • New (Zero-Knowledge) Arguments and Their Applications to Verifiable Computation 

    Zhang, Yupeng (2018)
    We study the problem of argument systems, where a computationally weak verifier outsources the execution of a computation to a powerful but untrusted prover, while being able to validate that the result was computed correctly ...
  • DEEP LEARNING FOR FASHION AND FORENSICS 

    Han, Xintong (2018)
    Deep learning is the new electricity, which has dramatically reshaped people's everyday life. In this thesis, we focus on two emerging applications of deep learning - fashion and forensics. The ubiquity of online fashion ...
  • NANOPHOTONIC DEVICES BASED ON LOW-DIMENSIONAL QUANTUM EMITTERS 

    Yang, Zhili (2018)
    Development of advanced nanophotonic devices is currently in rapid growth and revolutionizing the whole fields of integrated optics and photonics. Devices such as nanoscale LEDs & lasers, waveguide couplers and modulators ...

View more