Alert button
Picture for Hadi M. Dolatabadi

Hadi M. Dolatabadi

Alert button

Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning

Add code
Bookmark button
Alert button
Feb 17, 2024
Hadi M. Dolatabadi, Sarah M. Erfani, Christopher Leckie

Viaarxiv icon

The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models

Add code
Bookmark button
Alert button
Mar 15, 2023
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Figure 2 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Figure 3 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Figure 4 for The Devil's Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models
Viaarxiv icon

COLLIDER: A Robust Training Framework for Backdoor Data

Add code
Bookmark button
Alert button
Oct 13, 2022
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for COLLIDER: A Robust Training Framework for Backdoor Data
Figure 2 for COLLIDER: A Robust Training Framework for Backdoor Data
Figure 3 for COLLIDER: A Robust Training Framework for Backdoor Data
Figure 4 for COLLIDER: A Robust Training Framework for Backdoor Data
Viaarxiv icon

Adversarial Coreset Selection for Efficient Robust Training

Add code
Bookmark button
Alert button
Sep 13, 2022
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for Adversarial Coreset Selection for Efficient Robust Training
Figure 2 for Adversarial Coreset Selection for Efficient Robust Training
Figure 3 for Adversarial Coreset Selection for Efficient Robust Training
Figure 4 for Adversarial Coreset Selection for Efficient Robust Training
Viaarxiv icon

$\ell_\infty$-Robustness and Beyond: Unleashing Efficient Adversarial Training

Add code
Bookmark button
Alert button
Dec 01, 2021
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for $\ell_\infty$-Robustness and Beyond: Unleashing Efficient Adversarial Training
Figure 2 for $\ell_\infty$-Robustness and Beyond: Unleashing Efficient Adversarial Training
Figure 3 for $\ell_\infty$-Robustness and Beyond: Unleashing Efficient Adversarial Training
Figure 4 for $\ell_\infty$-Robustness and Beyond: Unleashing Efficient Adversarial Training
Viaarxiv icon

AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows

Add code
Bookmark button
Alert button
Jul 15, 2020
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
Figure 2 for AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
Figure 3 for AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
Figure 4 for AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows
Viaarxiv icon

Black-box Adversarial Example Generation with Normalizing Flows

Add code
Bookmark button
Alert button
Jul 06, 2020
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for Black-box Adversarial Example Generation with Normalizing Flows
Figure 2 for Black-box Adversarial Example Generation with Normalizing Flows
Figure 3 for Black-box Adversarial Example Generation with Normalizing Flows
Figure 4 for Black-box Adversarial Example Generation with Normalizing Flows
Viaarxiv icon

Invertible Generative Modeling using Linear Rational Splines

Add code
Bookmark button
Alert button
Jan 24, 2020
Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie

Figure 1 for Invertible Generative Modeling using Linear Rational Splines
Figure 2 for Invertible Generative Modeling using Linear Rational Splines
Figure 3 for Invertible Generative Modeling using Linear Rational Splines
Figure 4 for Invertible Generative Modeling using Linear Rational Splines
Viaarxiv icon