Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
Abstract. Motivated by image perturbation and the geometry of manifolds, we present a novel method combining these two elements. First, we form a tangent space from a set of pertur...
Abstract. We present a comparative study on how to use discriminative learning methods such as classification, regression, and ranking to address deformable shape segmentation. Tra...
Jingdan Zhang, Shaohua Kevin Zhou, Dorin Comaniciu...
Abstract. Establishing correspondence between features of a set of images has been a long-standing issue amongst the computer vision community. We propose a method that solves the ...