Picture for Alvin Chan

Alvin Chan

Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder

Add code
Oct 06, 2020
Figure 1 for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder
Figure 2 for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder
Figure 3 for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder
Figure 4 for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder
Viaarxiv icon

Player Identification in Hockey Broadcast Videos

Add code
Sep 14, 2020
Figure 1 for Player Identification in Hockey Broadcast Videos
Figure 2 for Player Identification in Hockey Broadcast Videos
Figure 3 for Player Identification in Hockey Broadcast Videos
Figure 4 for Player Identification in Hockey Broadcast Videos
Viaarxiv icon

CoCon: A Self-Supervised Approach for Controlled Text Generation

Add code
Jun 05, 2020
Figure 1 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Figure 2 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Figure 3 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Figure 4 for CoCon: A Self-Supervised Approach for Controlled Text Generation
Viaarxiv icon

Jacobian Adversarially Regularized Networks for Robustness

Add code
Jan 29, 2020
Figure 1 for Jacobian Adversarially Regularized Networks for Robustness
Figure 2 for Jacobian Adversarially Regularized Networks for Robustness
Figure 3 for Jacobian Adversarially Regularized Networks for Robustness
Figure 4 for Jacobian Adversarially Regularized Networks for Robustness
Viaarxiv icon

What it Thinks is Important is Important: Robustness Transfers through Input Gradients

Add code
Dec 11, 2019
Figure 1 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Figure 2 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Figure 3 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Figure 4 for What it Thinks is Important is Important: Robustness Transfers through Input Gradients
Viaarxiv icon

Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks

Add code
Nov 19, 2019
Figure 1 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Figure 2 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Figure 3 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Figure 4 for Poison as a Cure: Detecting & Neutralizing Variable-Sized Backdoor Attacks in Deep Neural Networks
Viaarxiv icon

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer

Add code
Sep 07, 2018
Figure 1 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Figure 2 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Figure 3 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Figure 4 for Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer
Viaarxiv icon