Picture for Cho-Jui Hsieh

Cho-Jui Hsieh

Generalizing Few-Shot NAS with Gradient Matching

Add code
Apr 05, 2022
Figure 1 for Generalizing Few-Shot NAS with Gradient Matching
Figure 2 for Generalizing Few-Shot NAS with Gradient Matching
Figure 3 for Generalizing Few-Shot NAS with Gradient Matching
Figure 4 for Generalizing Few-Shot NAS with Gradient Matching
Viaarxiv icon

On the Convergence of Certified Robust Training with Interval Bound Propagation

Add code
Mar 16, 2022
Figure 1 for On the Convergence of Certified Robust Training with Interval Bound Propagation
Viaarxiv icon

Towards Efficient and Scalable Sharpness-Aware Minimization

Add code
Mar 05, 2022
Figure 1 for Towards Efficient and Scalable Sharpness-Aware Minimization
Figure 2 for Towards Efficient and Scalable Sharpness-Aware Minimization
Figure 3 for Towards Efficient and Scalable Sharpness-Aware Minimization
Figure 4 for Towards Efficient and Scalable Sharpness-Aware Minimization
Viaarxiv icon

Extreme Zero-Shot Learning for Extreme Text Classification

Add code
Dec 16, 2021
Figure 1 for Extreme Zero-Shot Learning for Extreme Text Classification
Figure 2 for Extreme Zero-Shot Learning for Extreme Text Classification
Figure 3 for Extreme Zero-Shot Learning for Extreme Text Classification
Figure 4 for Extreme Zero-Shot Learning for Extreme Text Classification
Viaarxiv icon

Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks

Add code
Dec 15, 2021
Figure 1 for Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks
Figure 2 for Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks
Figure 3 for Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks
Figure 4 for Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks
Viaarxiv icon

A Review of Adversarial Attack and Defense for Classification Methods

Add code
Nov 18, 2021
Figure 1 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 2 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 3 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 4 for A Review of Adversarial Attack and Defense for Classification Methods
Viaarxiv icon

Can Vision Transformers Perform Convolution?

Add code
Nov 03, 2021
Figure 1 for Can Vision Transformers Perform Convolution?
Figure 2 for Can Vision Transformers Perform Convolution?
Figure 3 for Can Vision Transformers Perform Convolution?
Viaarxiv icon

Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction

Add code
Oct 29, 2021
Figure 1 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Figure 2 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Figure 3 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Figure 4 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Viaarxiv icon

How and When Adversarial Robustness Transfers in Knowledge Distillation?

Add code
Oct 22, 2021
Figure 1 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 2 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 3 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 4 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Viaarxiv icon

Adversarial Attack across Datasets

Add code
Oct 13, 2021
Figure 1 for Adversarial Attack across Datasets
Figure 2 for Adversarial Attack across Datasets
Figure 3 for Adversarial Attack across Datasets
Figure 4 for Adversarial Attack across Datasets
Viaarxiv icon