Alert button
Picture for Ali Shafahi

Ali Shafahi

Alert button

Adaptive Weight Decay: On The Fly Weight Decay Tuning for Improving Robustness

Add code
Bookmark button
Alert button
Sep 30, 2022
Amin Ghiasi, Ali Shafahi, Reza Ardekani

Figure 1 for Adaptive Weight Decay: On The Fly Weight Decay Tuning for Improving Robustness
Figure 2 for Adaptive Weight Decay: On The Fly Weight Decay Tuning for Improving Robustness
Figure 3 for Adaptive Weight Decay: On The Fly Weight Decay Tuning for Improving Robustness
Figure 4 for Adaptive Weight Decay: On The Fly Weight Decay Tuning for Improving Robustness
Viaarxiv icon

Towards Accurate Quantization and Pruning via Data-free Knowledge Transfer

Add code
Bookmark button
Alert button
Oct 14, 2020
Chen Zhu, Zheng Xu, Ali Shafahi, Manli Shu, Amin Ghiasi, Tom Goldstein

Figure 1 for Towards Accurate Quantization and Pruning via Data-free Knowledge Transfer
Figure 2 for Towards Accurate Quantization and Pruning via Data-free Knowledge Transfer
Figure 3 for Towards Accurate Quantization and Pruning via Data-free Knowledge Transfer
Figure 4 for Towards Accurate Quantization and Pruning via Data-free Knowledge Transfer
Viaarxiv icon

Exploring Model Robustness with Adaptive Networks and Improved Adversarial Training

Add code
Bookmark button
Alert button
May 30, 2020
Zheng Xu, Ali Shafahi, Tom Goldstein

Figure 1 for Exploring Model Robustness with Adaptive Networks and Improved Adversarial Training
Figure 2 for Exploring Model Robustness with Adaptive Networks and Improved Adversarial Training
Figure 3 for Exploring Model Robustness with Adaptive Networks and Improved Adversarial Training
Figure 4 for Exploring Model Robustness with Adaptive Networks and Improved Adversarial Training
Viaarxiv icon

Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates

Add code
Bookmark button
Alert button
Mar 19, 2020
Amin Ghiasi, Ali Shafahi, Tom Goldstein

Figure 1 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Figure 2 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Figure 3 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Figure 4 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Viaarxiv icon

WITCHcraft: Efficient PGD attacks with random step size

Add code
Bookmark button
Alert button
Nov 18, 2019
Ping-Yeh Chiang, Jonas Geiping, Micah Goldblum, Tom Goldstein, Renkun Ni, Steven Reich, Ali Shafahi

Figure 1 for WITCHcraft: Efficient PGD attacks with random step size
Figure 2 for WITCHcraft: Efficient PGD attacks with random step size
Figure 3 for WITCHcraft: Efficient PGD attacks with random step size
Figure 4 for WITCHcraft: Efficient PGD attacks with random step size
Viaarxiv icon

Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?

Add code
Bookmark button
Alert button
Oct 25, 2019
Ali Shafahi, Amin Ghiasi, Furong Huang, Tom Goldstein

Figure 1 for Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?
Figure 2 for Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?
Figure 3 for Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?
Figure 4 for Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?
Viaarxiv icon

Adversarial attacks on Copyright Detection Systems

Add code
Bookmark button
Alert button
Jun 20, 2019
Parsa Saadatpanah, Ali Shafahi, Tom Goldstein

Figure 1 for Adversarial attacks on Copyright Detection Systems
Figure 2 for Adversarial attacks on Copyright Detection Systems
Figure 3 for Adversarial attacks on Copyright Detection Systems
Figure 4 for Adversarial attacks on Copyright Detection Systems
Viaarxiv icon

Adversarially robust transfer learning

Add code
Bookmark button
Alert button
May 20, 2019
Ali Shafahi, Parsa Saadatpanah, Chen Zhu, Amin Ghiasi, Christoph Studer, David Jacobs, Tom Goldstein

Figure 1 for Adversarially robust transfer learning
Figure 2 for Adversarially robust transfer learning
Figure 3 for Adversarially robust transfer learning
Figure 4 for Adversarially robust transfer learning
Viaarxiv icon

Transferable Clean-Label Poisoning Attacks on Deep Neural Nets

Add code
Bookmark button
Alert button
May 16, 2019
Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein

Figure 1 for Transferable Clean-Label Poisoning Attacks on Deep Neural Nets
Figure 2 for Transferable Clean-Label Poisoning Attacks on Deep Neural Nets
Figure 3 for Transferable Clean-Label Poisoning Attacks on Deep Neural Nets
Figure 4 for Transferable Clean-Label Poisoning Attacks on Deep Neural Nets
Viaarxiv icon

Adversarial Training for Free!

Add code
Bookmark button
Alert button
Apr 29, 2019
Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, Tom Goldstein

Figure 1 for Adversarial Training for Free!
Figure 2 for Adversarial Training for Free!
Figure 3 for Adversarial Training for Free!
Figure 4 for Adversarial Training for Free!
Viaarxiv icon