Alert button
Picture for Carsten Rudolph

Carsten Rudolph

Alert button

RAI4IoE: Responsible AI for Enabling the Internet of Energy

Add code
Bookmark button
Alert button
Sep 20, 2023
Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer

Viaarxiv icon

Email Summarization to Assist Users in Phishing Identification

Add code
Bookmark button
Alert button
Mar 24, 2022
Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph

Figure 1 for Email Summarization to Assist Users in Phishing Identification
Figure 2 for Email Summarization to Assist Users in Phishing Identification
Viaarxiv icon

Robust Training Using Natural Transformation

Add code
Bookmark button
Alert button
May 10, 2021
Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore

Figure 1 for Robust Training Using Natural Transformation
Figure 2 for Robust Training Using Natural Transformation
Figure 3 for Robust Training Using Natural Transformation
Figure 4 for Robust Training Using Natural Transformation
Viaarxiv icon

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

Add code
Bookmark button
Alert button
May 03, 2021
Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba

Figure 1 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 2 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 3 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 4 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Viaarxiv icon

Adversarial Defense by Latent Style Transformations

Add code
Bookmark button
Alert button
Jun 17, 2020
Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen

Figure 1 for Adversarial Defense by Latent Style Transformations
Figure 2 for Adversarial Defense by Latent Style Transformations
Figure 3 for Adversarial Defense by Latent Style Transformations
Figure 4 for Adversarial Defense by Latent Style Transformations
Viaarxiv icon

Defending Adversarial Attacks via Semantic Feature Manipulation

Add code
Bookmark button
Alert button
Feb 03, 2020
Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen

Figure 1 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 2 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 3 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 4 for Defending Adversarial Attacks via Semantic Feature Manipulation
Viaarxiv icon

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning

Add code
Bookmark button
Alert button
Jan 18, 2020
Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler

Figure 1 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 2 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 3 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 4 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Viaarxiv icon

Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models

Add code
Bookmark button
Alert button
Jan 10, 2020
Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen

Figure 1 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 2 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 3 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 4 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Viaarxiv icon

Generating Semantic Adversarial Examples via Feature Manipulation

Add code
Bookmark button
Alert button
Jan 06, 2020
Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler

Figure 1 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 2 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 3 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 4 for Generating Semantic Adversarial Examples via Feature Manipulation
Viaarxiv icon

Defending Against Misclassification Attacks in Transfer Learning

Add code
Bookmark button
Alert button
Sep 12, 2019
Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph

Figure 1 for Defending Against Misclassification Attacks in Transfer Learning
Figure 2 for Defending Against Misclassification Attacks in Transfer Learning
Figure 3 for Defending Against Misclassification Attacks in Transfer Learning
Figure 4 for Defending Against Misclassification Attacks in Transfer Learning
Viaarxiv icon