Picture for Cho-Jui Hsieh

Cho-Jui Hsieh

Learning to Encode Position for Transformer with Continuous Dynamical Model

Add code
Mar 13, 2020
Figure 1 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Figure 2 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Figure 3 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Figure 4 for Learning to Encode Position for Transformer with Continuous Dynamical Model
Viaarxiv icon

Automatic Perturbation Analysis on General Computational Graphs

Add code
Feb 28, 2020
Figure 1 for Automatic Perturbation Analysis on General Computational Graphs
Figure 2 for Automatic Perturbation Analysis on General Computational Graphs
Figure 3 for Automatic Perturbation Analysis on General Computational Graphs
Figure 4 for Automatic Perturbation Analysis on General Computational Graphs
Viaarxiv icon

CAT: Customized Adversarial Training for Improved Robustness

Add code
Feb 17, 2020
Figure 1 for CAT: Customized Adversarial Training for Improved Robustness
Figure 2 for CAT: Customized Adversarial Training for Improved Robustness
Figure 3 for CAT: Customized Adversarial Training for Improved Robustness
Figure 4 for CAT: Customized Adversarial Training for Improved Robustness
Viaarxiv icon

Robustness Verification for Transformers

Add code
Feb 16, 2020
Figure 1 for Robustness Verification for Transformers
Figure 2 for Robustness Verification for Transformers
Figure 3 for Robustness Verification for Transformers
Figure 4 for Robustness Verification for Transformers
Viaarxiv icon

MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius

Add code
Feb 15, 2020
Figure 1 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Figure 2 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Figure 3 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Figure 4 for MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius
Viaarxiv icon

Multiscale Non-stationary Stochastic Bandits

Add code
Feb 13, 2020
Figure 1 for Multiscale Non-stationary Stochastic Bandits
Figure 2 for Multiscale Non-stationary Stochastic Bandits
Figure 3 for Multiscale Non-stationary Stochastic Bandits
Viaarxiv icon

Stabilizing Differentiable Architecture Search via Perturbation-based Regularization

Add code
Feb 12, 2020
Figure 1 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Figure 2 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Figure 3 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Figure 4 for Stabilizing Differentiable Architecture Search via Perturbation-based Regularization
Viaarxiv icon

GraphDefense: Towards Robust Graph Convolutional Networks

Add code
Nov 11, 2019
Figure 1 for GraphDefense: Towards Robust Graph Convolutional Networks
Figure 2 for GraphDefense: Towards Robust Graph Convolutional Networks
Figure 3 for GraphDefense: Towards Robust Graph Convolutional Networks
Figure 4 for GraphDefense: Towards Robust Graph Convolutional Networks
Viaarxiv icon

Enhancing Certifiable Robustness via a Deep Model Ensemble

Add code
Oct 31, 2019
Figure 1 for Enhancing Certifiable Robustness via a Deep Model Ensemble
Figure 2 for Enhancing Certifiable Robustness via a Deep Model Ensemble
Figure 3 for Enhancing Certifiable Robustness via a Deep Model Ensemble
Figure 4 for Enhancing Certifiable Robustness via a Deep Model Ensemble
Viaarxiv icon

A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning

Add code
Oct 30, 2019
Figure 1 for A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning
Figure 2 for A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning
Figure 3 for A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning
Figure 4 for A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning
Viaarxiv icon