Alert button
Picture for Alvin Chan

Alvin Chan

Alert button

CoCon: A Self-Supervised Approach for Controlled Text Generation

Add code
Bookmark button
Alert button
Jun 05, 2020
Alvin Chan, Yew-Soon Ong, Bill Pung, Aston Zhang, Jie Fu

Figure 1 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Figure 2 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Figure 3 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Figure 4 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Viaarxiv icon

Jacobian Adversarially Regularized Networks for Robustness

Add code
Bookmark button
Alert button
Jan 29, 2020
Alvin Chan, Yi Tay, Yew Soon Ong, Jie Fu

Figure 1 for Jacobian Adversarially Regularized Networks for Robustness
Figure 2 for Jacobian Adversarially Regularized Networks for Robustness
Figure 3 for Jacobian Adversarially Regularized Networks for Robustness
Figure 4 for Jacobian Adversarially Regularized Networks for Robustness
Viaarxiv icon

What it Thinks is Important is Important: Robustness Transfers through Input Gradients

Add code
Bookmark button
Alert button
Dec 11, 2019
Alvin Chan, Yi Tay, Yew-Soon Ong

Figure 1 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Figure 2 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Figure 3 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Figure 4 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Viaarxiv icon

Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks

Add code
Bookmark button
Alert button
Nov 19, 2019
Alvin Chan, Yew-Soon Ong

Figure 1 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Figure 2 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Figure 3 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Figure 4 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Viaarxiv icon

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer

Add code
Bookmark button
Alert button
Sep 07, 2018
Alvin Chan, Lei Ma, Felix Juefei-Xu, Xiaofei Xie, Yang Liu, Yew Soon Ong

Figure 1 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Figure 2 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Figure 3 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Figure 4 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Viaarxiv icon