Alert button
Picture for Bowei Xi

Bowei Xi

Alert button

Bio-Inspired Adversarial Attack Against Deep Neural Networks

Add code
Bookmark button
Alert button
Jun 30, 2021
Bowei Xi, Yujie Chen, Fan Fei, Zhan Tu, Xinyan Deng

Figure 1 for Bio-Inspired Adversarial Attack Against Deep Neural Networks
Figure 2 for Bio-Inspired Adversarial Attack Against Deep Neural Networks
Figure 3 for Bio-Inspired Adversarial Attack Against Deep Neural Networks
Figure 4 for Bio-Inspired Adversarial Attack Against Deep Neural Networks
Viaarxiv icon

Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges

Add code
Bookmark button
Alert button
Jun 30, 2021
Bowei Xi

Figure 1 for Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges
Figure 2 for Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges
Figure 3 for Adversarial Machine Learning for Cybersecurity and Computer Vision: Current Developments and Challenges
Viaarxiv icon

Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions

Add code
Bookmark button
Alert button
Jun 30, 2021
Juan Shu, Bowei Xi, Charles Kamhoua

Figure 1 for Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions
Figure 2 for Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions
Figure 3 for Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions
Figure 4 for Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions
Viaarxiv icon

Breaking Transferability of Adversarial Samples with Randomness

Add code
Bookmark button
Alert button
Jun 17, 2018
Yan Zhou, Murat Kantarcioglu, Bowei Xi

Figure 1 for Breaking Transferability of Adversarial Samples with Randomness
Figure 2 for Breaking Transferability of Adversarial Samples with Randomness
Figure 3 for Breaking Transferability of Adversarial Samples with Randomness
Figure 4 for Breaking Transferability of Adversarial Samples with Randomness
Viaarxiv icon

Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries

Add code
Bookmark button
Alert button
Apr 13, 2018
Wutao Wei, Bowei Xi, Murat Kantarcioglu

Figure 1 for Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries
Figure 2 for Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries
Figure 3 for Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries
Figure 4 for Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries
Viaarxiv icon