Alert button
Picture for Hanxun Huang

Hanxun Huang

Alert button

Multi-Trigger Backdoor Attacks: More Triggers, More Threats

Add code
Bookmark button
Alert button
Jan 27, 2024
Yige Li, Xingjun Ma, Jiabo He, Hanxun Huang, Yu-Gang Jiang

Viaarxiv icon

LDReg: Local Dimensionality Regularized Self-Supervised Learning

Add code
Bookmark button
Alert button
Jan 19, 2024
Hanxun Huang, Ricardo J. G. B. Campello, Sarah Monazam Erfani, Xingjun Ma, Michael E. Houle, James Bailey

Viaarxiv icon

Distilling Cognitive Backdoor Patterns within an Image

Add code
Bookmark button
Alert button
Jan 26, 2023
Hanxun Huang, Xingjun Ma, Sarah Erfani, James Bailey

Figure 1 for Distilling Cognitive Backdoor Patterns within an Image
Figure 2 for Distilling Cognitive Backdoor Patterns within an Image
Figure 3 for Distilling Cognitive Backdoor Patterns within an Image
Figure 4 for Distilling Cognitive Backdoor Patterns within an Image
Viaarxiv icon

Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks

Add code
Bookmark button
Alert button
Oct 21, 2021
Hanxun Huang, Yisen Wang, Sarah Monazam Erfani, Quanquan Gu, James Bailey, Xingjun Ma

Figure 1 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 2 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 3 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 4 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Viaarxiv icon

Unlearnable Examples: Making Personal Data Unexploitable

Add code
Bookmark button
Alert button
Jan 13, 2021
Hanxun Huang, Xingjun Ma, Sarah Monazam Erfani, James Bailey, Yisen Wang

Figure 1 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 2 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 3 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 4 for Unlearnable Examples: Making Personal Data Unexploitable
Viaarxiv icon

Neural Architecture Search via Combinatorial Multi-Armed Bandit

Add code
Bookmark button
Alert button
Jan 01, 2021
Hanxun Huang, Xingjun Ma, Sarah M. Erfani, James Bailey

Figure 1 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 2 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 3 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 4 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Viaarxiv icon

Normalized Loss Functions for Deep Learning with Noisy Labels

Add code
Bookmark button
Alert button
Jun 24, 2020
Xingjun Ma, Hanxun Huang, Yisen Wang, Simone Romano, Sarah Erfani, James Bailey

Figure 1 for Normalized Loss Functions for Deep Learning with Noisy Labels
Figure 2 for Normalized Loss Functions for Deep Learning with Noisy Labels
Figure 3 for Normalized Loss Functions for Deep Learning with Noisy Labels
Figure 4 for Normalized Loss Functions for Deep Learning with Noisy Labels
Viaarxiv icon