Alert button
Picture for Cho-Jui Hsieh

Cho-Jui Hsieh

Alert button

Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data

Add code
Bookmark button
Alert button
May 11, 2020
Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang

Figure 1 for Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Figure 2 for Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Figure 3 for Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Figure 4 for Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data
Viaarxiv icon

Improved Adversarial Training via Learned Optimizer

Add code
Bookmark button
Alert button
Apr 25, 2020
Yuanhao Xiong, Cho-Jui Hsieh

Figure 1 for Improved Adversarial Training via Learned Optimizer
Figure 2 for Improved Adversarial Training via Learned Optimizer
Figure 3 for Improved Adversarial Training via Learned Optimizer
Figure 4 for Improved Adversarial Training via Learned Optimizer
Viaarxiv icon

Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations

Add code
Bookmark button
Alert button
Mar 19, 2020
Huan Zhang, Hongge Chen, Chaowei Xiao, Bo Li, Duane Boning, Cho-Jui Hsieh

Figure 1 for Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations
Figure 2 for Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations
Figure 3 for Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations
Figure 4 for Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations
Viaarxiv icon

Learning to Encode Position for Transformer with Continuous Dynamical Model

Add code
Bookmark button
Alert button
Mar 13, 2020
Xuanqing Liu, Hsiang-Fu Yu, Inderjit Dhillon, Cho-Jui Hsieh

Figure 1 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Figure 2 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Figure 3 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Figure 4 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Viaarxiv icon

Automatic Perturbation Analysis on General Computational Graphs

Add code
Bookmark button
Alert button
Feb 28, 2020
Kaidi Xu, Zhouxing Shi, Huan Zhang, Minlie Huang, Kai-Wei Chang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh

Figure 1 for Automatic Perturbation Analysis on General Computational Graphs
Figure 2 for Automatic Perturbation Analysis on General Computational Graphs
Figure 3 for Automatic Perturbation Analysis on General Computational Graphs
Figure 4 for Automatic Perturbation Analysis on General Computational Graphs
Viaarxiv icon

CAT: Customized Adversarial Training for Improved Robustness

Add code
Bookmark button
Alert button
Feb 17, 2020
Minhao Cheng, Qi Lei, Pin-Yu Chen, Inderjit Dhillon, Cho-Jui Hsieh

Figure 1 for CAT: Customized Adversarial Training for Improved Robustness
Figure 2 for CAT: Customized Adversarial Training for Improved Robustness
Figure 3 for CAT: Customized Adversarial Training for Improved Robustness
Figure 4 for CAT: Customized Adversarial Training for Improved Robustness
Viaarxiv icon

Robustness Verification for Transformers

Add code
Bookmark button
Alert button
Feb 16, 2020
Zhouxing Shi, Huan Zhang, Kai-Wei Chang, Minlie Huang, Cho-Jui Hsieh

Figure 1 for Robustness Verification for Transformers
Figure 2 for Robustness Verification for Transformers
Figure 3 for Robustness Verification for Transformers
Figure 4 for Robustness Verification for Transformers
Viaarxiv icon

MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius

Add code
Bookmark button
Alert button
Feb 15, 2020
Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang

Figure 1 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Figure 2 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Figure 3 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Figure 4 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Viaarxiv icon

Multiscale Non-stationary Stochastic Bandits

Add code
Bookmark button
Alert button
Feb 13, 2020
Qin Ding, Cho-Jui Hsieh, James Sharpnack

Figure 1 for Multiscale Non-stationary Stochastic Bandits
Figure 2 for Multiscale Non-stationary Stochastic Bandits
Figure 3 for Multiscale Non-stationary Stochastic Bandits
Viaarxiv icon

Stabilizing Differentiable Architecture Search via Perturbation-based Regularization

Add code
Bookmark button
Alert button
Feb 12, 2020
Xiangning Chen, Cho-Jui Hsieh

Figure 1 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Figure 2 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Figure 3 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Figure 4 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Viaarxiv icon