Alert button
Picture for Huichen Li

Huichen Li

Alert button

Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation

Add code
Bookmark button
Alert button
Jun 10, 2021
Jiawei Zhang, Linyi Li, Huichen Li, Xiaolu Zhang, Shuang Yang, Bo Li

Figure 1 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Figure 2 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Figure 3 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Figure 4 for Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation
Viaarxiv icon

Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks

Add code
Bookmark button
Alert button
Feb 25, 2021
Huichen Li, Linyi Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li

Figure 1 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Figure 2 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Figure 3 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Figure 4 for Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks
Viaarxiv icon

Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving

Add code
Bookmark button
Alert button
Jan 26, 2021
James Tu, Huichen Li, Xinchen Yan, Mengye Ren, Yun Chen, Ming Liang, Eilyan Bitar, Ersin Yumer, Raquel Urtasun

Figure 1 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Figure 2 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Figure 3 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Figure 4 for Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving
Viaarxiv icon

QEBA: Query-Efficient Boundary-Based Blackbox Attack

Add code
Bookmark button
Alert button
May 28, 2020
Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li

Figure 1 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Figure 2 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Figure 3 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Figure 4 for QEBA: Query-Efficient Boundary-Based Blackbox Attack
Viaarxiv icon

Detecting AI Trojans Using Meta Neural Analysis

Add code
Bookmark button
Alert button
Oct 09, 2019
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li

Figure 1 for Detecting AI Trojans Using Meta Neural Analysis
Figure 2 for Detecting AI Trojans Using Meta Neural Analysis
Figure 3 for Detecting AI Trojans Using Meta Neural Analysis
Figure 4 for Detecting AI Trojans Using Meta Neural Analysis
Viaarxiv icon

Data Poisoning Attack against Unsupervised Node Embedding Methods

Add code
Bookmark button
Alert button
Nov 01, 2018
Mingjie Sun, Jian Tang, Huichen Li, Bo Li, Chaowei Xiao, Yao Chen, Dawn Song

Figure 1 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 2 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 3 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 4 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Viaarxiv icon