Alert button
Picture for Cho-Jui Hsieh

Cho-Jui Hsieh

Alert button

The Limitations of Adversarial Training and the Blind-Spot Attack

Add code
Bookmark button
Alert button
Jan 15, 2019
Huan Zhang, Hongge Chen, Zhao Song, Duane Boning, Inderjit S. Dhillon, Cho-Jui Hsieh

Figure 1 for The Limitations of Adversarial Training and the Blind-Spot Attack
Figure 2 for The Limitations of Adversarial Training and the Blind-Spot Attack
Figure 3 for The Limitations of Adversarial Training and the Blind-Spot Attack
Figure 4 for The Limitations of Adversarial Training and the Blind-Spot Attack
Viaarxiv icon

Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding

Add code
Bookmark button
Alert button
Dec 09, 2018
Yao Li, Martin Renqiang Min, Wenchao Yu, Cho-Jui Hsieh, Thomas C. M. Lee, Erik Kruus

Figure 1 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 2 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 3 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 4 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Viaarxiv icon

Block-wise Partitioning for Extreme Multi-label Classification

Add code
Bookmark button
Alert button
Nov 04, 2018
Yuefeng Liang, Cho-Jui Hsieh, Thomas C. M. Lee

Figure 1 for Block-wise Partitioning for Extreme Multi-label Classification
Figure 2 for Block-wise Partitioning for Extreme Multi-label Classification
Figure 3 for Block-wise Partitioning for Extreme Multi-label Classification
Figure 4 for Block-wise Partitioning for Extreme Multi-label Classification
Viaarxiv icon

Efficient Neural Network Robustness Certification with General Activation Functions

Add code
Bookmark button
Alert button
Nov 02, 2018
Huan Zhang, Tsui-Wei Weng, Pin-Yu Chen, Cho-Jui Hsieh, Luca Daniel

Figure 1 for Efficient Neural Network Robustness Certification with General Activation Functions
Figure 2 for Efficient Neural Network Robustness Certification with General Activation Functions
Figure 3 for Efficient Neural Network Robustness Certification with General Activation Functions
Figure 4 for Efficient Neural Network Robustness Certification with General Activation Functions
Viaarxiv icon

Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks

Add code
Bookmark button
Alert button
Oct 29, 2018
Patrick H. Chen, Si Si, Sanjiv Kumar, Yang Li, Cho-Jui Hsieh

Figure 1 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Figure 2 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Figure 3 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Figure 4 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Viaarxiv icon

RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications

Add code
Bookmark button
Alert button
Oct 28, 2018
Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh

Figure 1 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Figure 2 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Figure 3 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Figure 4 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Viaarxiv icon

Attack Graph Convolutional Networks by Adding Fake Nodes

Add code
Bookmark button
Alert button
Oct 26, 2018
Xiaoyun Wang, Joe Eaton, Cho-Jui Hsieh, Felix Wu

Figure 1 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 2 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 3 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 4 for Attack Graph Convolutional Networks by Adding Fake Nodes
Viaarxiv icon

On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm

Add code
Bookmark button
Alert button
Oct 19, 2018
Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Aurelie Lozano, Cho-Jui Hsieh, Luca Daniel

Figure 1 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Figure 2 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Figure 3 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Figure 4 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Viaarxiv icon

Towards Fast Computation of Certified Robustness for ReLU Networks

Add code
Bookmark button
Alert button
Oct 02, 2018
Tsui-Wei Weng, Huan Zhang, Hongge Chen, Zhao Song, Cho-Jui Hsieh, Duane Boning, Inderjit S. Dhillon, Luca Daniel

Figure 1 for Towards Fast Computation of Certified Robustness for ReLU Networks
Figure 2 for Towards Fast Computation of Certified Robustness for ReLU Networks
Figure 3 for Towards Fast Computation of Certified Robustness for ReLU Networks
Viaarxiv icon

Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network

Add code
Bookmark button
Alert button
Oct 01, 2018
Xuanqing Liu, Yao Li, Chongruo Wu, Cho-Jui Hsieh

Figure 1 for Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Figure 2 for Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Figure 3 for Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Figure 4 for Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network
Viaarxiv icon