Alert button
Picture for Bo Li

Bo Li

Alert button

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Dec 30, 2020
Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein

Figure 1 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 2 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 3 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 4 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Viaarxiv icon

Longitudinal diffusion MRI analysis using Segis-Net: a single-step deep-learning framework for simultaneous segmentation and registration

Dec 28, 2020
Bo Li, Wiro J. Niessen, Stefan Klein, Marius de Groot, M. Arfan Ikram, Meike W. Vernooij, Esther E. Bron

Figure 1 for Longitudinal diffusion MRI analysis using Segis-Net: a single-step deep-learning framework for simultaneous segmentation and registration
Figure 2 for Longitudinal diffusion MRI analysis using Segis-Net: a single-step deep-learning framework for simultaneous segmentation and registration
Figure 3 for Longitudinal diffusion MRI analysis using Segis-Net: a single-step deep-learning framework for simultaneous segmentation and registration
Figure 4 for Longitudinal diffusion MRI analysis using Segis-Net: a single-step deep-learning framework for simultaneous segmentation and registration
Viaarxiv icon

Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Dec 18, 2020
Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein

Figure 1 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 2 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 3 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 4 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Viaarxiv icon

On the Limitations of Denoising Strategies as Adversarial Defenses

Dec 17, 2020
Zhonghan Niu, Zhaoxi Chen, Linyi Li, Yubin Yang, Bo Li, Jinfeng Yi

Figure 1 for On the Limitations of Denoising Strategies as Adversarial Defenses
Figure 2 for On the Limitations of Denoising Strategies as Adversarial Defenses
Figure 3 for On the Limitations of Denoising Strategies as Adversarial Defenses
Figure 4 for On the Limitations of Denoising Strategies as Adversarial Defenses
Viaarxiv icon

UnrealPerson: An Adaptive Pipeline towards Costless Person Re-identification

Dec 09, 2020
Tianyu Zhang, Lingxi Xie, Longhui Wei, Zijie Zhuang, Yongfei Zhang, Bo Li, Qi Tian

Figure 1 for UnrealPerson: An Adaptive Pipeline towards Costless Person Re-identification
Figure 2 for UnrealPerson: An Adaptive Pipeline towards Costless Person Re-identification
Figure 3 for UnrealPerson: An Adaptive Pipeline towards Costless Person Re-identification
Figure 4 for UnrealPerson: An Adaptive Pipeline towards Costless Person Re-identification
Viaarxiv icon

Evaluating adversarial robustness in simulated cerebellum

Dec 05, 2020
Liu Yuezhang, Bo Li, Qifeng Chen

Figure 1 for Evaluating adversarial robustness in simulated cerebellum
Figure 2 for Evaluating adversarial robustness in simulated cerebellum
Viaarxiv icon

Modelling the Point Spread Function of Wide Field Small Aperture Telescopes With Deep Neural Networks -- Applications in Point Spread Function Estimation

Nov 20, 2020
Peng Jia, Xuebo Wu, Zhengyang Li, Bo Li, Weihua Wang, Qiang Liu, Adam Popowicz

Figure 1 for Modelling the Point Spread Function of Wide Field Small Aperture Telescopes With Deep Neural Networks -- Applications in Point Spread Function Estimation
Figure 2 for Modelling the Point Spread Function of Wide Field Small Aperture Telescopes With Deep Neural Networks -- Applications in Point Spread Function Estimation
Figure 3 for Modelling the Point Spread Function of Wide Field Small Aperture Telescopes With Deep Neural Networks -- Applications in Point Spread Function Estimation
Figure 4 for Modelling the Point Spread Function of Wide Field Small Aperture Telescopes With Deep Neural Networks -- Applications in Point Spread Function Estimation
Viaarxiv icon

Decoupled Appearance and Motion Learning for Efficient Anomaly Detection in Surveillance Video

Nov 12, 2020
Bo Li, Sam Leroux, Pieter Simoens

Figure 1 for Decoupled Appearance and Motion Learning for Efficient Anomaly Detection in Surveillance Video
Figure 2 for Decoupled Appearance and Motion Learning for Efficient Anomaly Detection in Surveillance Video
Figure 3 for Decoupled Appearance and Motion Learning for Efficient Anomaly Detection in Surveillance Video
Figure 4 for Decoupled Appearance and Motion Learning for Efficient Anomaly Detection in Surveillance Video
Viaarxiv icon

Automated Model Compression by Jointly Applied Pruning and Quantization

Nov 12, 2020
Wenting Tang, Xingxing Wei, Bo Li

Figure 1 for Automated Model Compression by Jointly Applied Pruning and Quantization
Figure 2 for Automated Model Compression by Jointly Applied Pruning and Quantization
Figure 3 for Automated Model Compression by Jointly Applied Pruning and Quantization
Figure 4 for Automated Model Compression by Jointly Applied Pruning and Quantization
Viaarxiv icon

MUSE: Illustrating Textual Attributes by Portrait Generation

Nov 09, 2020
Xiaodan Hu, Pengfei Yu, Kevin Knight, Heng Ji, Bo Li, Honghui Shi

Figure 1 for MUSE: Illustrating Textual Attributes by Portrait Generation
Figure 2 for MUSE: Illustrating Textual Attributes by Portrait Generation
Figure 3 for MUSE: Illustrating Textual Attributes by Portrait Generation
Figure 4 for MUSE: Illustrating Textual Attributes by Portrait Generation
Viaarxiv icon