Alert button
Picture for Huiying Li

Huiying Li

Alert button

Independently Keypoint Learning for Small Object Semantic Correspondence

Add code
Bookmark button
Alert button
Apr 03, 2024
Hailong Jin, Huiying Li

Viaarxiv icon

Question Answering Over Spatio-Temporal Knowledge Graph

Add code
Bookmark button
Alert button
Feb 18, 2024
Xinbang Dai, Huiying Li, Guilin Qi

Viaarxiv icon

Can Backdoor Attacks Survive Time-Varying Models?

Add code
Bookmark button
Alert button
Jun 08, 2022
Huiying Li, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng

Figure 1 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 2 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 3 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 4 for Can Backdoor Attacks Survive Time-Varying Models?
Viaarxiv icon

Outlining and Filling: Hierarchical Query Graph Generation for Answering Complex Questions over Knowledge Graph

Add code
Bookmark button
Alert button
Nov 01, 2021
Yongrui Chen, Huiying Li, Guilin Qi, Tianxing Wu, Tenggou Wang

Figure 1 for Outlining and Filling: Hierarchical Query Graph Generation for Answering Complex Questions over Knowledge Graph
Figure 2 for Outlining and Filling: Hierarchical Query Graph Generation for Answering Complex Questions over Knowledge Graph
Figure 3 for Outlining and Filling: Hierarchical Query Graph Generation for Answering Complex Questions over Knowledge Graph
Figure 4 for Outlining and Filling: Hierarchical Query Graph Generation for Answering Complex Questions over Knowledge Graph
Viaarxiv icon

Leveraging Table Content for Zero-shot Text-to-SQL with Meta-Learning

Add code
Bookmark button
Alert button
Sep 12, 2021
Yongrui Chen, Xinnan Guo, Chaojie Wang, Jian Qiu, Guilin Qi, Meng Wang, Huiying Li

Figure 1 for Leveraging Table Content for Zero-shot Text-to-SQL with Meta-Learning
Figure 2 for Leveraging Table Content for Zero-shot Text-to-SQL with Meta-Learning
Figure 3 for Leveraging Table Content for Zero-shot Text-to-SQL with Meta-Learning
Figure 4 for Leveraging Table Content for Zero-shot Text-to-SQL with Meta-Learning
Viaarxiv icon

Formal Query Building with Query Structure Prediction for Complex Question Answering over Knowledge Base

Add code
Bookmark button
Alert button
Sep 08, 2021
Yongrui Chen, Huiying Li, Yuncheng Hua, Guilin Qi

Figure 1 for Formal Query Building with Query Structure Prediction for Complex Question Answering over Knowledge Base
Figure 2 for Formal Query Building with Query Structure Prediction for Complex Question Answering over Knowledge Base
Figure 3 for Formal Query Building with Query Structure Prediction for Complex Question Answering over Knowledge Base
Figure 4 for Formal Query Building with Query Structure Prediction for Complex Question Answering over Knowledge Base
Viaarxiv icon

Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks

Add code
Bookmark button
Alert button
Jun 24, 2020
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao

Figure 1 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 2 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 3 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Figure 4 for Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks
Viaarxiv icon

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models

Add code
Bookmark button
Alert button
Feb 19, 2020
Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao

Figure 1 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 2 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 3 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Figure 4 for Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models
Viaarxiv icon

Persistent and Unforgeable Watermarks for Deep Neural Networks

Add code
Bookmark button
Alert button
Oct 02, 2019
Huiying Li, Emily Willson, Haitao Zheng, Ben Y. Zhao

Figure 1 for Persistent and Unforgeable Watermarks for Deep Neural Networks
Figure 2 for Persistent and Unforgeable Watermarks for Deep Neural Networks
Figure 3 for Persistent and Unforgeable Watermarks for Deep Neural Networks
Figure 4 for Persistent and Unforgeable Watermarks for Deep Neural Networks
Viaarxiv icon

Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks

Add code
Bookmark button
Alert button
May 24, 2019
Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao

Figure 1 for Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Figure 2 for Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Figure 3 for Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Figure 4 for Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks
Viaarxiv icon