Picture for Cho-Jui Hsieh

Cho-Jui Hsieh

A Review of Adversarial Attack and Defense for Classification Methods

Add code
Nov 18, 2021
Figure 1 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 2 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 3 for A Review of Adversarial Attack and Defense for Classification Methods
Figure 4 for A Review of Adversarial Attack and Defense for Classification Methods
Viaarxiv icon

Can Vision Transformers Perform Convolution?

Add code
Nov 03, 2021
Figure 1 for Can Vision Transformers Perform Convolution?
Figure 2 for Can Vision Transformers Perform Convolution?
Figure 3 for Can Vision Transformers Perform Convolution?
Viaarxiv icon

Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction

Add code
Oct 29, 2021
Figure 1 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Figure 2 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Figure 3 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Figure 4 for Node Feature Extraction by Self-Supervised Multi-scale Neighborhood Prediction
Viaarxiv icon

How and When Adversarial Robustness Transfers in Knowledge Distillation?

Add code
Oct 22, 2021
Figure 1 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 2 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 3 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Figure 4 for How and When Adversarial Robustness Transfers in Knowledge Distillation?
Viaarxiv icon

Adversarial Attack across Datasets

Add code
Oct 13, 2021
Figure 1 for Adversarial Attack across Datasets
Figure 2 for Adversarial Attack across Datasets
Figure 3 for Adversarial Attack across Datasets
Figure 4 for Adversarial Attack across Datasets
Viaarxiv icon

Training Meta-Surrogate Model for Transferable Adversarial Attack

Add code
Sep 07, 2021
Figure 1 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 2 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 3 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Figure 4 for Training Meta-Surrogate Model for Transferable Adversarial Attack
Viaarxiv icon

Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution

Add code
Aug 29, 2021
Figure 1 for Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution
Figure 2 for Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution
Figure 3 for Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution
Figure 4 for Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution
Viaarxiv icon

RANK-NOSH: Efficient Predictor-Based Architecture Search via Non-Uniform Successive Halving

Add code
Aug 18, 2021
Figure 1 for RANK-NOSH: Efficient Predictor-Based Architecture Search via Non-Uniform Successive Halving
Figure 2 for RANK-NOSH: Efficient Predictor-Based Architecture Search via Non-Uniform Successive Halving
Figure 3 for RANK-NOSH: Efficient Predictor-Based Architecture Search via Non-Uniform Successive Halving
Figure 4 for RANK-NOSH: Efficient Predictor-Based Architecture Search via Non-Uniform Successive Halving
Viaarxiv icon

RandomRooms: Unsupervised Pre-training from Synthetic Shapes and Randomized Layouts for 3D Object Detection

Add code
Aug 17, 2021
Figure 1 for RandomRooms: Unsupervised Pre-training from Synthetic Shapes and Randomized Layouts for 3D Object Detection
Figure 2 for RandomRooms: Unsupervised Pre-training from Synthetic Shapes and Randomized Layouts for 3D Object Detection
Figure 3 for RandomRooms: Unsupervised Pre-training from Synthetic Shapes and Randomized Layouts for 3D Object Detection
Figure 4 for RandomRooms: Unsupervised Pre-training from Synthetic Shapes and Randomized Layouts for 3D Object Detection
Viaarxiv icon

Rethinking Architecture Selection in Differentiable NAS

Add code
Aug 10, 2021
Figure 1 for Rethinking Architecture Selection in Differentiable NAS
Figure 2 for Rethinking Architecture Selection in Differentiable NAS
Figure 3 for Rethinking Architecture Selection in Differentiable NAS
Figure 4 for Rethinking Architecture Selection in Differentiable NAS
Viaarxiv icon