Alert button
Picture for Akshay Mehra

Akshay Mehra

Alert button

On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization

Jul 17, 2023
Akshay Mehra, Yunbei Zhang, Bhavya Kailkhura, Jihun Hamm

Figure 1 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Figure 2 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Figure 3 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Figure 4 for On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization
Viaarxiv icon

Analysis of Task Transferability in Large Pre-trained Classifiers

Jul 03, 2023
Akshay Mehra, Yunbei Zhang, Jihun Hamm

Figure 1 for Analysis of Task Transferability in Large Pre-trained Classifiers
Figure 2 for Analysis of Task Transferability in Large Pre-trained Classifiers
Figure 3 for Analysis of Task Transferability in Large Pre-trained Classifiers
Figure 4 for Analysis of Task Transferability in Large Pre-trained Classifiers
Viaarxiv icon

Understanding the Robustness of Multi-Exit Models under Common Corruptions

Dec 03, 2022
Akshay Mehra, Skyler Seto, Navdeep Jaitly, Barry-John Theobald

Figure 1 for Understanding the Robustness of Multi-Exit Models under Common Corruptions
Figure 2 for Understanding the Robustness of Multi-Exit Models under Common Corruptions
Figure 3 for Understanding the Robustness of Multi-Exit Models under Common Corruptions
Figure 4 for Understanding the Robustness of Multi-Exit Models under Common Corruptions
Viaarxiv icon

On Certifying and Improving Generalization to Unseen Domains

Jun 24, 2022
Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

Figure 1 for On Certifying and Improving Generalization to Unseen Domains
Figure 2 for On Certifying and Improving Generalization to Unseen Domains
Figure 3 for On Certifying and Improving Generalization to Unseen Domains
Figure 4 for On Certifying and Improving Generalization to Unseen Domains
Viaarxiv icon

Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines

Dec 01, 2021
Jiachen Sun, Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Dan Hendrycks, Jihun Hamm, Z. Morley Mao

Figure 1 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Figure 2 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Figure 3 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Figure 4 for Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines
Viaarxiv icon

Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning

Jul 08, 2021
Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

Figure 1 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Figure 2 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Figure 3 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Figure 4 for Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning
Viaarxiv icon

Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks

Jun 15, 2021
Byunggill Joe, Akshay Mehra, Insik Shin, Jihun Hamm

Figure 1 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Figure 2 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Figure 3 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Figure 4 for Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks
Viaarxiv icon

How Robust are Randomized Smoothing based Defenses to Data Poisoning?

Dec 02, 2020
Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

Figure 1 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Figure 2 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Figure 3 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Figure 4 for How Robust are Randomized Smoothing based Defenses to Data Poisoning?
Viaarxiv icon

Penalty Method for Inversion-Free Deep Bilevel Optimization

Nov 08, 2019
Akshay Mehra, Jihun Hamm

Figure 1 for Penalty Method for Inversion-Free Deep Bilevel Optimization
Figure 2 for Penalty Method for Inversion-Free Deep Bilevel Optimization
Figure 3 for Penalty Method for Inversion-Free Deep Bilevel Optimization
Figure 4 for Penalty Method for Inversion-Free Deep Bilevel Optimization
Viaarxiv icon

Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples

Jun 27, 2018
Jihun Hamm, Akshay Mehra

Figure 1 for Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples
Figure 2 for Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples
Figure 3 for Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples
Figure 4 for Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples
Viaarxiv icon