Circular Image

S.E. Verwer

54 records found

Combining data from Randomized Controlled Trials (RCTs) is a widely used method to estimate causal treatment effects. In order to combine data, the property of transportability, under which different covariate vectors exhibit similar treatment benefit, must hold between the RCTs. ...
Coastal zones are dynamic and vulnerable regions, demanding accurate, scalable monitoring tools to inform environmental management and hazard mitigation. While satellite imagery and CNN-based classifiers have improved automated mapping, their reliance on unstructured pixel data l ...
Effective LLM-based automated program repair (APR) methods can lead to massive cost reductions and have improved significantly in recent times. However, the validity of many APR evaluations as they are conducted at this point is at risk due to data leakage: Prior research has sho ...
Writing test cases is an important yet complex task. Search-Based Software Testing (SBST) is an automated test case generation technique that aims to help developers by creating high-coverage test cases. Despite its strengths, a major limitation of this technique is that it often ...
Computers have become an essential part of modern life. They are used in a wide range of applications, from smartphones and laptops to data centers and supercomputers. However, the increasing usage of computers has led to a rise in energy consumption, which has significant enviro ...
Procedural Content Generation (PCG) is a method to automatically generate content with little to no human assistance required. It emerges as a promising tool to generate educational content tailored to individual learning needs, a fundamental aspect of effective teaching.
Th ...

Procedural content generation in education

Orchestration of content using PCG

Procedural Content Generation (PCG) is a powerful content generation technique that can be used to automatically generate content (an example would be exercises for a quiz or a game). As it stands, PCG is able to create content with zero human interaction which makes it a techniq ...
The use of deep learning models has advanced in gaze-tracking systems, but it has also introduced new vulnerabilities to backdoor attacks, such as BadNets. This attack allows models to behave normally on regular inputs. However, it produces malicious outputs when the attacker-cho ...

Imperceptible Backdoor Attacks on Deep Regression Models

Applying a backdoor attack to compromise a gaze estimation model

This research investigates backdoor attacks on deep regression models, focusing on the gaze estimation task. Backdoor triggers can be used to poison a model during training phase to have a hidden misbehaving functionality. For gaze estimation, a backdoored model will return an at ...

Imperceptible Backdoor Attacks for Deep Regression Models

Adapting the SIG Backdoor Attack to the Head Pose Estimation Task

With the rise of deep learning and the widespread use of deep neural networks, backdoor attacks have become a significant security threat, drawing considerable research interest. One such attack is the SIG backdoor attack, which introduces signals to the images. We look into thre ...

Imperceptible Backdoor Attacks on Deep Regression Using the WaNet Method

Using Warping-Based Poisoned Networks to Covertly Compromise a Deep Regression Model

Deep Regression Models (DRMs) are a subset of deep learning models that output continuous values. Due to their performance, DRMs are widely used as critical components in various systems. As training a DRM is resource-intensive, many rely on pre-trained third-party models, which ...
Previous research has explored the detection of adversarial examples with dimensional reduction and Out-of-Distribution (OOD) recognition. However, these approaches are not effective against white-box adversarial attacks. Moreover, recent OOD methods that utilize hidden units hin ...
Emotion recognition is a challenging problem in the field of computer vision. The automatic classification of emotions using facial expressions is a promising approach to understand human behavior in various applications such as marketing, health, and education. How- ever, recogn ...
Chess recognition refers to the task of identifying the chess pieces configuration from a chessboard image. Contrary to the predominant approach that aims to solve this task through the pipeline of chessboard detection, square localization, and piece classification, we rely on th ...
Kotlin is a programming language best known for its interoperability with Java, as well as the measurable improvements it offers over it. Since it became Android’s go-to language in 2019, the popularity and impact of Kotlin have risen greatly. Amidst this surge in popularity, the ...

VoBERT: Unstable Log Sequence Anomaly Detection

Introducing Vocabulary-Free BERT

With the ever-increasing digitalisation of society and the explosion of internet-enabled devices with the Internet of Things (IoT), keeping services and devices secure is becoming more important. Logs play a critical role in sustaining system reliability. Manual analysis of logs ...
On the intuitive level, software testing is important because it assures the quality of the software used by humans. However, ensuring this quality is not an easy task because as the complexity of the software increases, so do the efforts to test it. Search-based software testing ...
Software testing is a laborious job, and accounts for a large portion of software development expenses. Search-based automatic test case generation is an area of research that attempts to remedy this by discovering algorithms suited for generating test cases automatically. In thi ...
In recent decades, automatic test generation has advanced significantly, providing developers with time-saving benefits and facilitating software debugging. While most research in this field focused on search-based test generation tools for statically-typed languages, only a few ...
Software testing is an important but time-consuming task, making automatic test case generation an appealing solution. The current state-of-the-art algorithm for test case generation is DynaMOSA, which is an improvement of NSGA-II that applies domain knowledge to make it more sui ...