Picture for Cho-Jui Hsieh

Cho-Jui Hsieh

A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks

Add code
Feb 26, 2019
Figure 1 for A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks
Figure 2 for A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks
Figure 3 for A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks
Figure 4 for A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks
Viaarxiv icon

Large-Batch Training for LSTM and Beyond

Add code
Jan 24, 2019
Figure 1 for Large-Batch Training for LSTM and Beyond
Figure 2 for Large-Batch Training for LSTM and Beyond
Figure 3 for Large-Batch Training for LSTM and Beyond
Figure 4 for Large-Batch Training for LSTM and Beyond
Viaarxiv icon

The Limitations of Adversarial Training and the Blind-Spot Attack

Add code
Jan 15, 2019
Figure 1 for The Limitations of Adversarial Training and the Blind-Spot Attack
Figure 2 for The Limitations of Adversarial Training and the Blind-Spot Attack
Figure 3 for The Limitations of Adversarial Training and the Blind-Spot Attack
Figure 4 for The Limitations of Adversarial Training and the Blind-Spot Attack
Viaarxiv icon

Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding

Add code
Dec 09, 2018
Figure 1 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 2 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 3 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Figure 4 for Optimal Transport Classifier: Defending Against Adversarial Attacks by Regularized Deep Embedding
Viaarxiv icon

Block-wise Partitioning for Extreme Multi-label Classification

Add code
Nov 04, 2018
Figure 1 for Block-wise Partitioning for Extreme Multi-label Classification
Figure 2 for Block-wise Partitioning for Extreme Multi-label Classification
Figure 3 for Block-wise Partitioning for Extreme Multi-label Classification
Figure 4 for Block-wise Partitioning for Extreme Multi-label Classification
Viaarxiv icon

Efficient Neural Network Robustness Certification with General Activation Functions

Add code
Nov 02, 2018
Figure 1 for Efficient Neural Network Robustness Certification with General Activation Functions
Figure 2 for Efficient Neural Network Robustness Certification with General Activation Functions
Figure 3 for Efficient Neural Network Robustness Certification with General Activation Functions
Figure 4 for Efficient Neural Network Robustness Certification with General Activation Functions
Viaarxiv icon

Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks

Add code
Oct 29, 2018
Figure 1 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Figure 2 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Figure 3 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Figure 4 for Learning to Screen for Fast Softmax Inference on Large Vocabulary Neural Networks
Viaarxiv icon

RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications

Add code
Oct 28, 2018
Figure 1 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Figure 2 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Figure 3 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Figure 4 for RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications
Viaarxiv icon

Attack Graph Convolutional Networks by Adding Fake Nodes

Add code
Oct 26, 2018
Figure 1 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 2 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 3 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 4 for Attack Graph Convolutional Networks by Adding Fake Nodes
Viaarxiv icon

On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm

Add code
Oct 19, 2018
Figure 1 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Figure 2 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Figure 3 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Figure 4 for On Extensions of CLEVER: A Neural Network Robustness Evaluation Algorithm
Viaarxiv icon